skip to main content
10.1145/2665943.2665957acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

General Area or Approximate Location?: How People Understand Location Permissions

Published: 03 November 2014 Publication History

Abstract

More than half of American adults use smartphones and about two thirds of them use location-based services. On Android smartphones, these location-based services are implemented by apps. Android phones provide two location-related permissions: "precise" location and "approximate" location. In this paper, we present an online survey of 106 Android users to investigate how people understand location descriptions related to their apps. Our results suggest that most participants considered the "precise" location to mean their exact location and the "approximate" location as a general area. This mental model of the "approximate" location seems to allay people's privacy concerns related to their apps. However, after participants were shown the ground truth of how accurate "approximate" location actually is, twice as many participants no longer thought "approximate" location offered enough protection, compared to before showing the ground truth. Our results indicate that the location permissions might mislead smartphone users about the privacy protections the apps are providing.

References

[1]
R. Balebako, R. Shay, and L. F. Cranor. Is your inseam a biometric? evaluating the understandability of mobile privacy notice categories. Technical Report Carnegie Mellon University-CyLab-13-011, Carnegie Mellon University, 2013.
[2]
A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner. Android permissions: user attention, comprehension, and behavior. In Proc. SOUPS'12, 2012.
[3]
H. Fu, Y. Yang, N. Shingte, J. Lindqvist, and M. Gruteser. A field study of run-time location access disclosures on Android smartphones. In Proc. USEC'14, 2014.
[4]
P. G. Kelley, S. Consolvo, L. F. Cranor, J. Jung, N. Sadeh, and D. Wetherall. A conundrum of permissions: installing applications on an Android smartphone. In Proc. USEC'12, 2012.
[5]
P. G. Leon, B. Ur, Y. Wang, M. Sleeper, R. Balebako, R. Shay, L. Bauer, M. Christodorescu, and L. F. Cranor. What matters to users' factors that affect users' willingness to share information with online advertisers. In Proc. SOUPS'13, 2013.
[6]
M. Ott. Unique turker. http://uniqueturker.myleott.com.
[7]
A. SMITH. Smartphone ownership 2013, June 2013. Pew Internet, Tech. Rep. http://pewinternet.org/Reports/2013/Smartphone-Ownership-2013.aspx.
[8]
K. Zickuhr. Location-based services. Technical report, Pew Internet, 2013. http://pewinternet.org/Reports/2013/Location.aspx.

Cited By

View all
  • (2024)What You Experience is What We Collect: User Experience Based Fine-Grained Permissions for Everyday Augmented RealityProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642668(1-24)Online publication date: 11-May-2024
  • (2024)Approximate vs. precise location in popular location-based servicesJournal of Location Based Services10.1080/17489725.2024.231000619:1(1-42)Online publication date: 20-Jun-2024
  • (2023)Privacy Is the Price: Player Views and Technical Evaluation of Data Practices in Online GamesProceedings of the ACM on Human-Computer Interaction10.1145/36110647:CHI PLAY(1136-1178)Online publication date: 4-Oct-2023
  • Show More Cited By

Index Terms

  1. General Area or Approximate Location?: How People Understand Location Permissions

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic Society
        November 2014
        218 pages
        ISBN:9781450331487
        DOI:10.1145/2665943
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 03 November 2014

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. android
        2. location permissions
        3. mental models
        4. privacy

        Qualifiers

        • Research-article

        Funding Sources

        Conference

        CCS'14
        Sponsor:

        Upcoming Conference

        CCS '25

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)3
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 28 Feb 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)What You Experience is What We Collect: User Experience Based Fine-Grained Permissions for Everyday Augmented RealityProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642668(1-24)Online publication date: 11-May-2024
        • (2024)Approximate vs. precise location in popular location-based servicesJournal of Location Based Services10.1080/17489725.2024.231000619:1(1-42)Online publication date: 20-Jun-2024
        • (2023)Privacy Is the Price: Player Views and Technical Evaluation of Data Practices in Online GamesProceedings of the ACM on Human-Computer Interaction10.1145/36110647:CHI PLAY(1136-1178)Online publication date: 4-Oct-2023
        • (2019)A Light-Weight Framework for Pre-submission Vetting of Android Applications in App StoresDependability in Sensor, Cloud, and Big Data Systems and Applications10.1007/978-981-15-1304-6_28(356-368)Online publication date: 5-Nov-2019
        • (2017)Understanding and granting android permissions: A user survey2017 International Carnahan Conference on Security Technology (ICCST)10.1109/CCST.2017.8167834(1-6)Online publication date: Oct-2017
        • (2016)No time at allProceedings of the 3rd Workshop on Hot Topics in Wireless10.1145/2980115.2980117(12-16)Online publication date: 3-Oct-2016
        • (2015)Android permissions remystifiedProceedings of the 24th USENIX Conference on Security Symposium10.5555/2831143.2831175(499-514)Online publication date: 12-Aug-2015

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media