Abstract
Our smartphone is full of applications and data that analytically organize, facilitate and describe our lives. We install applications for the most varied reasons, to inform us, to have fun and for work, but, unfortunately, we often install them without reading the terms and conditions of use. The result is that our privacy is increasingly at risk. Considering this scenario, in this paper, we analyze the user’s perception towards privacy while using smartphone applications. In particular, we formulate two different hypotheses: 1) the perception of privacy is influenced by the knowledge of the data used by the installed applications; 2) applications access to much more data than they need. The study is based on two questionnaires (within-subject experiments with 200 volunteers) and on the lists of installed apps (30 volunteers). Results show a widespread abuse of data related to location, personal contacts, camera, Wi-Fi network list, running apps list, and vibration. An in-depth analysis shows that some features are more relevant to certain groups of users (e.g., adults are mainly worried about contacts and Wi-Fi connection lists; iOS users are sensitive to smartphone vibration; female participants are worried about possible misuse of the smartphone camera).
Similar content being viewed by others
References
Brandeis L, Warren Sl (1890) The right to privacy. Harvard Law Rev 4(5):193–220
Smith JH, Milberg SJ, Burke SJ (1996) Information privacy: measuring individuals’ concerns about organizational practices. MIS quarterly
Elahi S (2009) Privacy and consent in the digital era. Inf Secur Tech Report 14(3):113–118
Isaak J, Hanna MJ (2018) User data privacy: Facebook, cambridge analytica, and privacy protection. Computer 51(8):56–59
Bujari A, Furini M, Laina N (2017) On using cashtags to predict companies stock trends. In: IEEE consumer communications networking conference, pp 25–28
Furini M, Montangero M (2018) Sentiment analysis and twitter: a game proposal. Pers Ubiquit Comput 22(4):771–785
Dusi N, Ferretti I, Furini M (2017) A transmedia storytelling system to transform recorded film memories into visual history. Entertain Comput 21:65–75
Egidi L, Furini M (2005) Bringing multimedia contents into MP3 files. IEEE Commun Mag 43(5):90–97
Furini M, Galli G, Martini MC (2019) An online education system to produce and distribute video lectures. Mobile Networks and Applications
Federico M, Furini M (2014) An automatic caption alignment mechanism for off-the-shelf speech recognition technologies. Multimed Tools Appl 72(1):21–40
Furini M, De Michele R (2019) On improving the engagement between viewers and tv commercials through gamification. Multimedia Systems
De Michele R, Ferretti S, Furini M (2019) On helping broadcasters to promote tv-shows through hashtags. Multimed Tools Appl 78(3):3279–3296
Hettrich M (2014) Data privacy regulation in the age of smartphones. TOuRO L REv 31:981
Shklovski I, Mainwaring SD, Skúladóttir HH, Borgthorsson H (2014) Leakiness and creepiness in app space: Perceptions of privacy and mobile app use. In: Proc ACM conf. on human factors in computing systems, pp 2347–2356
Bujari A, Furini M, Mandreoli F, Martoglia R, Montangero M, Ronzani D (Feb 2018) Standards, security and business models: Key challenges for the iot scenario. Mobile Netw Appl 23(1):147–154
Au KWY, Yi FZ, Huang Z, Lie D (2012) Pscout: analyzing the android permission specification. In: Proceedings of the 2012 ACM conference on Computer and communications security, pp 217–228. ACM
Furini M, Mandreoli F, Martoglia R, Montangero M (2017) Iot: Science fiction or real revolution?. In: Proceedings of the international conference on smart objects and technologies for social good. Springer
De Michele R, Furini M (2019) Iot healthcare: Benefits, issues and challenges. In: Proceedings of the international conference on smart objects and technologies for social good (GoodTechs 2019). ACM
Meng W, Fei F, Li W, Au MH (2017) Harvesting smartphone privacy through enhanced juice filming charging attacks. In: Nguyen PQ, Zhou J (eds) Information security. Springer International Publishing, Cham, pp 291–308
Balebako R, Jung J, Lu W, Cranor LF, Nguyen C (2013) Little brothers watching you: Raising awareness of data leaks on smartphones. In: Proceedings of the 9th symposium on usable privacy and security, pp 12. ACM
Aditya P, Bhattacharjee B, Druschel P, Erdelyi V, Lentz M (2014) Brave new world: Privacy risks for mobile users. In: Proc ACM mobicom workshop on security and privacy in mobile environments, pp 7–12
Furini M, Tamanini V (2015) Location privacy and public metadata in social media platforms: attitudes, behaviors and opinions. Multimed Tools Appl 74(21):9795–9825
Lin J, Amini S, Hong J I, Sadeh N, Lindqvist J, Zhang J (2012) Expectation and purpose: Understanding users’ mental models of mobile app privacy through crowdsourcing. In: Proc. acm conf. on ubiquitous computing, pp 501–510
Momen N, Piekarska M (2017) Towards improving privacy awareness regarding apps’ permissions. In: International conference on digital society, nice, France, March 19-23, 2017, pp 18–23
Furini M (2014) Users behavior in location-aware services: Digital natives vs digital immigrants. Advances in Human-Computer Interaction
Barth S, De Jong MDT (2017) The privacy paradox–investigating discrepancies between expressed privacy concerns and actual online behavior–a systematic literature review. Telematics Inform 34(7):1038–1058
Furini M, Mirri S, Montangero M, Prandi C (2019) Privacy perception and user behavior in the mobile ecosystem. In: Proceedings of the international conference on smart objects and technologies for social good, pp 177–182. ACM
Beresford AR, Rice A, Skehin N, Sohan R (2011) Mockdroid: trading privacy for application functionality on smartphones. In: Proceedings of the 12th workshop on mobile computing systems and applications, pp 49–54. ACM
Enck W, Gilbert P, Han S, Tendulkar V, Chun B-G, Cox LP, Jung J, McDaniel P, Sheth AN (2014) Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans Comput Syst (TOCS) 32(2):5
Dai W, Qiu M, Qiu L, Chen L, Wu A (2017) Who moved my data? privacy protection in smartphones. IEEE Comm Mag 55(1): 20–25
Khalid H, Shihab E, Nagappan M, Hassan A E (2015) What do mobile app users complain about? IEEE Softw 32(3):70–77
Baig M M, GholamHosseini H, Connolly M J (2015) Mobile healthcare applications: System design review, critical issues and challenges. Australas Phys Eng Sci Med 38(1):23–38
Alenezi M, Almomani I (2017) Abusing android permissions: A security perspective. In: IEEE Jordan conf. on applied electrical engineering and computing technologies (AEECT), pp 1–6
Almuhimedi H, Schaub F, Sadeh N, Adjerid I, Acquisti A, Gluck J, Cranor LF, Agarwal Y (2015) Your location has been shared 5,398 times!: A field study on mobile app privacy nudging. In: Conference on Human Factors in Computing Systems
Liu B, Andersen MS, Schaub F, Almuhimedi H, Zhang SA, Sadeh N, Agarwal Y, Acquisti A (2016) Follow my recommendations: A personalized privacy assistant for mobile app permissions. In: Symp. on usable privacy and security. USENIX Association
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Furini, M., Mirri, S., Montangero, M. et al. Privacy Perception when Using Smartphone Applications. Mobile Netw Appl 25, 1055–1061 (2020). https://doi.org/10.1007/s11036-020-01529-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-020-01529-z