Skip to main content
Log in

Privacy Perception when Using Smartphone Applications

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Our smartphone is full of applications and data that analytically organize, facilitate and describe our lives. We install applications for the most varied reasons, to inform us, to have fun and for work, but, unfortunately, we often install them without reading the terms and conditions of use. The result is that our privacy is increasingly at risk. Considering this scenario, in this paper, we analyze the user’s perception towards privacy while using smartphone applications. In particular, we formulate two different hypotheses: 1) the perception of privacy is influenced by the knowledge of the data used by the installed applications; 2) applications access to much more data than they need. The study is based on two questionnaires (within-subject experiments with 200 volunteers) and on the lists of installed apps (30 volunteers). Results show a widespread abuse of data related to location, personal contacts, camera, Wi-Fi network list, running apps list, and vibration. An in-depth analysis shows that some features are more relevant to certain groups of users (e.g., adults are mainly worried about contacts and Wi-Fi connection lists; iOS users are sensitive to smartphone vibration; female participants are worried about possible misuse of the smartphone camera).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Brandeis L, Warren Sl (1890) The right to privacy. Harvard Law Rev 4(5):193–220

    Article  Google Scholar 

  2. Smith JH, Milberg SJ, Burke SJ (1996) Information privacy: measuring individuals’ concerns about organizational practices. MIS quarterly

  3. Elahi S (2009) Privacy and consent in the digital era. Inf Secur Tech Report 14(3):113–118

    Article  Google Scholar 

  4. Isaak J, Hanna MJ (2018) User data privacy: Facebook, cambridge analytica, and privacy protection. Computer 51(8):56–59

    Article  Google Scholar 

  5. Bujari A, Furini M, Laina N (2017) On using cashtags to predict companies stock trends. In: IEEE consumer communications networking conference, pp 25–28

  6. Furini M, Montangero M (2018) Sentiment analysis and twitter: a game proposal. Pers Ubiquit Comput 22(4):771–785

    Article  Google Scholar 

  7. Dusi N, Ferretti I, Furini M (2017) A transmedia storytelling system to transform recorded film memories into visual history. Entertain Comput 21:65–75

    Article  Google Scholar 

  8. Egidi L, Furini M (2005) Bringing multimedia contents into MP3 files. IEEE Commun Mag 43(5):90–97

    Article  Google Scholar 

  9. Furini M, Galli G, Martini MC (2019) An online education system to produce and distribute video lectures. Mobile Networks and Applications

  10. Federico M, Furini M (2014) An automatic caption alignment mechanism for off-the-shelf speech recognition technologies. Multimed Tools Appl 72(1):21–40

    Article  Google Scholar 

  11. Furini M, De Michele R (2019) On improving the engagement between viewers and tv commercials through gamification. Multimedia Systems

  12. De Michele R, Ferretti S, Furini M (2019) On helping broadcasters to promote tv-shows through hashtags. Multimed Tools Appl 78(3):3279–3296

    Article  Google Scholar 

  13. Hettrich M (2014) Data privacy regulation in the age of smartphones. TOuRO L REv 31:981

    Google Scholar 

  14. Shklovski I, Mainwaring SD, Skúladóttir HH, Borgthorsson H (2014) Leakiness and creepiness in app space: Perceptions of privacy and mobile app use. In: Proc ACM conf. on human factors in computing systems, pp 2347–2356

  15. Bujari A, Furini M, Mandreoli F, Martoglia R, Montangero M, Ronzani D (Feb 2018) Standards, security and business models: Key challenges for the iot scenario. Mobile Netw Appl 23(1):147–154

  16. Au KWY, Yi FZ, Huang Z, Lie D (2012) Pscout: analyzing the android permission specification. In: Proceedings of the 2012 ACM conference on Computer and communications security, pp 217–228. ACM

  17. Furini M, Mandreoli F, Martoglia R, Montangero M (2017) Iot: Science fiction or real revolution?. In: Proceedings of the international conference on smart objects and technologies for social good. Springer

  18. De Michele R, Furini M (2019) Iot healthcare: Benefits, issues and challenges. In: Proceedings of the international conference on smart objects and technologies for social good (GoodTechs 2019). ACM

  19. Meng W, Fei F, Li W, Au MH (2017) Harvesting smartphone privacy through enhanced juice filming charging attacks. In: Nguyen PQ, Zhou J (eds) Information security. Springer International Publishing, Cham, pp 291–308

  20. Balebako R, Jung J, Lu W, Cranor LF, Nguyen C (2013) Little brothers watching you: Raising awareness of data leaks on smartphones. In: Proceedings of the 9th symposium on usable privacy and security, pp 12. ACM

  21. Aditya P, Bhattacharjee B, Druschel P, Erdelyi V, Lentz M (2014) Brave new world: Privacy risks for mobile users. In: Proc ACM mobicom workshop on security and privacy in mobile environments, pp 7–12

  22. Furini M, Tamanini V (2015) Location privacy and public metadata in social media platforms: attitudes, behaviors and opinions. Multimed Tools Appl 74(21):9795–9825

    Article  Google Scholar 

  23. Lin J, Amini S, Hong J I, Sadeh N, Lindqvist J, Zhang J (2012) Expectation and purpose: Understanding users’ mental models of mobile app privacy through crowdsourcing. In: Proc. acm conf. on ubiquitous computing, pp 501–510

  24. Momen N, Piekarska M (2017) Towards improving privacy awareness regarding apps’ permissions. In: International conference on digital society, nice, France, March 19-23, 2017, pp 18–23

  25. Furini M (2014) Users behavior in location-aware services: Digital natives vs digital immigrants. Advances in Human-Computer Interaction

  26. Barth S, De Jong MDT (2017) The privacy paradox–investigating discrepancies between expressed privacy concerns and actual online behavior–a systematic literature review. Telematics Inform 34(7):1038–1058

    Article  Google Scholar 

  27. Furini M, Mirri S, Montangero M, Prandi C (2019) Privacy perception and user behavior in the mobile ecosystem. In: Proceedings of the international conference on smart objects and technologies for social good, pp 177–182. ACM

  28. Beresford AR, Rice A, Skehin N, Sohan R (2011) Mockdroid: trading privacy for application functionality on smartphones. In: Proceedings of the 12th workshop on mobile computing systems and applications, pp 49–54. ACM

  29. Enck W, Gilbert P, Han S, Tendulkar V, Chun B-G, Cox LP, Jung J, McDaniel P, Sheth AN (2014) Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans Comput Syst (TOCS) 32(2):5

    Article  Google Scholar 

  30. Dai W, Qiu M, Qiu L, Chen L, Wu A (2017) Who moved my data? privacy protection in smartphones. IEEE Comm Mag 55(1): 20–25

    Article  Google Scholar 

  31. Khalid H, Shihab E, Nagappan M, Hassan A E (2015) What do mobile app users complain about? IEEE Softw 32(3):70–77

    Article  Google Scholar 

  32. Baig M M, GholamHosseini H, Connolly M J (2015) Mobile healthcare applications: System design review, critical issues and challenges. Australas Phys Eng Sci Med 38(1):23–38

    Article  Google Scholar 

  33. Alenezi M, Almomani I (2017) Abusing android permissions: A security perspective. In: IEEE Jordan conf. on applied electrical engineering and computing technologies (AEECT), pp 1–6

  34. Almuhimedi H, Schaub F, Sadeh N, Adjerid I, Acquisti A, Gluck J, Cranor LF, Agarwal Y (2015) Your location has been shared 5,398 times!: A field study on mobile app privacy nudging. In: Conference on Human Factors in Computing Systems

  35. Liu B, Andersen MS, Schaub F, Almuhimedi H, Zhang SA, Sadeh N, Agarwal Y, Acquisti A (2016) Follow my recommendations: A personalized privacy assistant for mobile app permissions. In: Symp. on usable privacy and security. USENIX Association

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marco Furini.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Furini, M., Mirri, S., Montangero, M. et al. Privacy Perception when Using Smartphone Applications. Mobile Netw Appl 25, 1055–1061 (2020). https://doi.org/10.1007/s11036-020-01529-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-020-01529-z

Keywords

Navigation