skip to main content
10.1145/2335356.2335360acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
research-article

Android permissions: user attention, comprehension, and behavior

Published:11 July 2012Publication History

ABSTRACT

Android's permission system is intended to inform users about the risks of installing applications. When a user installs an application, he or she has the opportunity to review the application's permission requests and cancel the installation if the permissions are excessive or objectionable. We examine whether the Android permission system is effective at warning users. In particular, we evaluate whether Android users pay attention to, understand, and act on permission information during installation. We performed two usability studies: an Internet survey of 308 Android users, and a laboratory study wherein we interviewed and observed 25 Android users. Study participants displayed low attention and comprehension rates: both the Internet survey and laboratory study found that 17% of participants paid attention to permissions during installation, and only 3% of Internet survey respondents could correctly answer all three permission comprehension questions. This indicates that current Android permission warnings do not help most users make correct security decisions. However, a notable minority of users demonstrated both awareness of permission warnings and reasonable rates of comprehension. We present recommendations for improving user attention and comprehension, as well as identify open challenges.

References

  1. AdMob Mobile Metrics Report. AdMob Blog, 2010.Google ScholarGoogle Scholar
  2. How Consumers Interact with Mobile App Advertising. Harris Interactive Survey, December 2011.Google ScholarGoogle Scholar
  3. M. Ackerman, L. Cranor, and J. Reagle. Privacy in e-commerce: examining user scenarios and privacy preferences. In Proceedings of the ACM Conference on Electronic Commerce, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Acquisti. Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the ACM Electronic Commerce Conference (ACM EC), 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Android Open Source Project. Android Security Overview, 2012.Google ScholarGoogle Scholar
  6. L. Barkhuus and A. Dey. Location-based services for mobile telephony: a study of users' privacy concerns. In Proceedings of the International Conference on Human-Computer Interaction, 2003.Google ScholarGoogle Scholar
  7. J. R. Bettman. An Information Processing Theory of Consumer Choice. Addison-Wesley Publishing Company, 1979.Google ScholarGoogle Scholar
  8. N. J. Blunch. Position Bias in Multiple-Choice Questions. Journal of Marketing Research, 1984.Google ScholarGoogle Scholar
  9. T. Buchanan, C. Paine, A. N. Joinson, and U.-D. Reips. Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Consolvo, I. E. Smith, T. Matthews, A. LaMarca, J. Tabert, and P. Powledge. Location disclosure to social relations: why, when, & what people want to share. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. L. F. Cranor. A Framework for Reasoning about the Human in the Loop. In Proceedings of the Conference on Usability, Psychology, and Security. USENIX Association, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Egelman, L. F. Cranor, and J. Hong. You've Been Warned: An empirical study of the effectiveness of web browser phishing warnings. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI), 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A study of Android application security. In Proceedings of the USENIX Security Symposium, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. W. Enck, M. Ongtang, and P. McDaniel. On lightweight mobile phone application certification. In Proceedings of the ACM Conference on Computer and Communication Security (CCS), 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android Permissions Demystified. In Proceedings of the ACM Conference on Computer and Communication Security (CCS), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner. A Survey of Mobile Malware in the Wild. In Proceedings of the ACM Workshop on Security and Privacy in Mobile Devices (SPSM), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. P. Felt, K. Greenwood, and D. Wagner. The Effectiveness of Application Permissions. In Proceedings of the USENIX Conference on Web Application Development (WebApps), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. A. Fuchs, A. Chaudhuri, and J. Foster. SCanDroid: Automated Security Certification of Android Applications. Technical report, University of Maryland, 2009.Google ScholarGoogle Scholar
  20. G. J. Gaeth and J. Shanteau. Reducing the Influence of Irrelevant Information on Experienced Decision Makers. Organizational Behavior and Human Performance, 33, 1984.Google ScholarGoogle Scholar
  21. P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data From Imperious Applications. In Proceedings of the ACM Conference on Computer and Communication Security, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. J. Howell and S. Schechter. What you see is what they get. In Proceedings of the IEEE Workshop on Web 2.0 Security and Privacy (W2SP), 2010.Google ScholarGoogle Scholar
  23. C. Jensen, C. Potts, and C. Jensen. Privacy practices of Internet users: Self-reports versus observed behavior. In International Journal of Human-Computer Studies, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. P. Kelley, M. Benisch, L. Cranor, and N. Sadeh. When are users comfortable sharing locations with advertisers? In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. P. G. Kelley, S. Consolvo, L. F. Cranor, J. Jung, N. Sadeh, and D. Wetherall. A Conundrum of Permissions: Installng Applications on an Android Smartphone. In Proceedings of the Workshop on Usable Security (USEC), 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. J. King, A. Lampinen, and A. Smolen. Privacy: Is There An App for That? In Proceedings of the Symposium on Usable Privacy and Security (SOUPS), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. P. Kumaraguru and L. F. Cranor. Privacy Indexes: A Survey of Westin's Studies. Technical report, Carnegie Mellon University CMU-ISRI-5-138, 2015.Google ScholarGoogle Scholar
  28. R. Leung, L. Findlater, J. McGrenere, P. Graf, and J. Yang. Multi-Layered Interfaces to Improve Older Adults' Initial Learnability of Mobile Applications. ACM Transactions on Accessible Computing (TACCESS), 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. J. Lindqvist, J. Cranshaw, J. Wiese, J. Hong, and J. Zimmerman. I'm the mayor of my house: examining why people use Foursquare - a social-driven location sharing application. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. W. A. Magat, W. K. Viscusi, and J. Huber. Consumer Processing of Hazard Warning Information. Journal of Risk and Uncertainty, 1, 1988.Google ScholarGoogle Scholar
  31. S. Motiee, K. Hawkey, and K. Beznosov. Do windows users follow the principle of least privilege?: investigating user account control practices. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS), 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. K. Mueller and K. Butler. Flex-P: Flexible Android Permissions. IEEE Symposium on Security and Privacy, Poster Session, 2011.Google ScholarGoogle Scholar
  33. M. Nauman, S. Khan, M. Alam, and X. Zhang. Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints. In ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. P. Nickinson. Android Market now has more than a quarter-million applications, 2011.Google ScholarGoogle Scholar
  35. F. Roesner, T. Kohno, A. Moshchuk, B. Parno, H. Wang, and C. Cowan. User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems. In Proceedings of the IEEE Conference on Security and Privacy, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley, M. Prabaker, and J. Rao. Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer. The Emperor's New Security Indicators. In Proceedings of the IEEE Symposium on Security and Privacy, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. S. Sen and D. Lerman. Why are you telling me this? An examination into negative consumer reviews on the web. Journal of Interactive Marketing, 21, 2007.Google ScholarGoogle Scholar
  39. B. Shneiderman. Promoting universal usability with multi-layer interface design. In Proceedings of the Conference on Universal Usability (CUU), 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. F. Cranor. Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In Proceedings of the USENIX Security Symposium, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. F. Cranor. Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In Proceedings of the USENIX Security Symposium, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. H. Taylor. Most People are "Privacy Pragmatists" Who, While Concerned about Privacy, Will Sometimes Trade It Off for Other Benefits. Harris Interactive, March 2003.Google ScholarGoogle Scholar
  43. S. Thurm and Y. I. Kane. Your apps are watching you, 2010.Google ScholarGoogle Scholar
  44. M. S. Wogalter. Communication-Human Information Processing (C-HIP) Model. In Handbook of Warnings. Lawrence Erlbaum Associates, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  45. M. S. Wogalter. Purpose and scope of warnings. In Handbook of Warnings. Lawrence Erlbaum Associates, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  46. Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2012.Google ScholarGoogle Scholar
  47. F. Zhu and X. Zhang. Impact of Online Consumer Reviews on Sales: The Moderating Role of Product and Consumer Characteristics. Journal of Marketing, 74, 2010.Google ScholarGoogle Scholar

Index Terms

  1. Android permissions: user attention, comprehension, and behavior

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          SOUPS '12: Proceedings of the Eighth Symposium on Usable Privacy and Security
          July 2012
          216 pages
          ISBN:9781450315326
          DOI:10.1145/2335356

          Copyright © 2012 Authors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 11 July 2012

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate15of49submissions,31%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader