skip to main content
10.1145/3387905.3388610acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
short-paper

On the elicitation of privacy and ethics preferences of mobile users

Published:07 October 2020Publication History

ABSTRACT

Nowadays, mobile users are constantly being connected and increasingly asked to express their personal preferences in the digital world. User preferences deal with simple device settings options, like notification alarms, as well as relevant ethical choices relating to the user behavior, privacy ones included (e.g., concerning the unauthorized disclosure and mining of personal data, as well as the access to restricted resources). All these preferences define the user, they are the building blocks of her digital identity and will be increasingly important given the growing rise of autonomous technologies and their ethical implications. The settings that enable these preferences are often hard to locate and hard to understand, even in popular apps and operating systems. Moreover, they can expose privacy, be employed for profiling or exploited for malicious activities. In this landscape, we devise the introduction of a Personal Preferences Automation Module (PPAM) capable of automatically inferring, applying and enforcing user choices in multiple scenarios ranging from speeding up simple time consuming tasks, to managing sensitive ethical choices. The wide range of sensors and devices that can be found in the mobile domain makes it a privileged context in which to employ the proposed module. In this paper, we present two application scenarios and describe the proposed approach at work on them.

References

  1. 2018. European Group on Ethics in Science and New Technologies. Statement on Artificial Intelligence, Robotics and 'Autonomous' Systems. https://ec.europa.eu/research/ege/pdf/ege_ai_statement_2018.pdf.Google ScholarGoogle Scholar
  2. Chadia Abras, Diane Maloney-Krichmar, Jenny Preece, et al. 2004. User-centered design. Bainbridge, W. Encyclopedia of Human-Computer Interaction. Thousand Oaks: Sage Publications 37, 4 (2004), 445--456.Google ScholarGoogle Scholar
  3. Alessandro Acquisti, Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman Sadeh, Florian Schaub, Manya Sleeper, and et al. 2017. Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online. ACM Comput. Surv. 50, 3, Article 44 (Aug. 2017), 41 pages.Google ScholarGoogle Scholar
  4. Christoph Anderson, Isabel Fernanda Hübener, Ann-Kathrin Seipp, Sandra Ohly, Klaus David, and Veljko Pejovic. 2018. A Survey of Attention Management Systems in Ubiquitous Computing Environments. IMWUT 2, 2 (2018), 58:1--58:27.Google ScholarGoogle Scholar
  5. APP Annie. 2020. The State of Mobile in 2020: The Key Stats You Need to Know. https://www.appannie.com/go/state-of-mobile-2020Google ScholarGoogle Scholar
  6. Apple. 2020. Apple ID. https://appleid.apple.comGoogle ScholarGoogle Scholar
  7. Apple. 2020. Human Interface Guidelines. https://developer.apple.com/design/human-interface-guidelines/ios/app-architecture/settings/Google ScholarGoogle Scholar
  8. Apple. 2020. Screen Time. https://support.apple.com/en-us/HT208982Google ScholarGoogle Scholar
  9. Marco Autili, Davide Di Ruscio, Paola Inverardi, Patrizio Pelliccione, and Massimo Tivoli. 2019. A Software Exoskeleton to Protect and Support Citizen's Ethics and Privacy in the Digital World. IEEE Access 7 (2019), 62011--62021.Google ScholarGoogle ScholarCross RefCross Ref
  10. Edmond Awad, Sohan Dsouza, Richard Kim, Jonathan Schulz, Joseph Henrich, Azim Shariff, Jean-François Bonnefon, and Iyad Rahwan. 2018. The moral machine experiment. Nature 563, 7729 (2018), 59--64.Google ScholarGoogle Scholar
  11. Sundeep Bajikar. 2002. Trusted platform module (tpm) based security on notebook pcs-white paper. Mobile Platforms Group Intel Corporation (2002), 1--20.Google ScholarGoogle Scholar
  12. Rainer Böhme and Jens Grossklags. 2011. The security cost of cheap user interaction. In Proceedings of the 2011 New Security Paradigms Workshop. ACM, 67--82.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Peter Burgess, L. Floridi, A. Pols, and J. van den Hoven. 2018. Towards a digital ethics - EDPS Ethics Advisory Group. https://edps.europa.eu/sites/edp/files/publication/18-01-25_eag_report_en.pdf.Google ScholarGoogle Scholar
  14. Carole Cadwalladr and Emma Graham-Harrison. 2018. Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. The guardian 17 (2018), 22.Google ScholarGoogle Scholar
  15. Yi Chen, Mingming Zha, Nan Zhang, Dandan Xu, Qianqian Zhao, Xuan Feng, Kan Yuan, Fnu Suya, Yuan Tian, Kai Chen, et al. 2019. Demystifying Hidden Privacy Settings in Mobile Apps. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 570--586.Google ScholarGoogle Scholar
  16. European Commission. [n.d.]. Statement on artficial intelligence, robotics and 'autonomous' systems. https://ec.europa.eu/research/ege/pdf/ege_ai_statement_2018.pdfGoogle ScholarGoogle Scholar
  17. Stefania Costantini, Giovanni De Gasperis, and Patrizio Migliarini. 2019. Multiagent System Engineering for Emphatic Human-Robot Interaction. In 2019 IEEE Second International Conference on Artificial Intelligence and Knowledge Engineering (AIKE). IEEE, 36--42.Google ScholarGoogle Scholar
  18. Android Developers. [n.d.]. Android Settings Menu. https://source.android.com/devices/tech/settings/Google ScholarGoogle Scholar
  19. Peter Eckersley. 2010. How unique is your web browser?. In International Symposium on Privacy Enhancing Technologies Symposium. Springer, 1--18.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. EDPS. 2015. Leading by example, The EDPS Strategy 2015-2019. https://edps.europa.eu/sites/edp/files/publication/15-07-30_strategy_2015_2019_update_en.pdf.Google ScholarGoogle Scholar
  21. Empatica. 2020. Embrace2. https://www.empatica.com/embrace2/Google ScholarGoogle Scholar
  22. Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, and David A. Wagner. 2011. Android permissions demystified. In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17--21, 2011. 627--638.Google ScholarGoogle Scholar
  23. Luciano Floridi. 2015. Luciano Floridi---Commentary on the Onlife Manifesto. In The onlife manifesto. Springer, Cham, 21--23.Google ScholarGoogle Scholar
  24. Luciano Floridi. 2018. Soft Ethics and the Governance of the Digital. Philosophy & Technology 31, 1 (2018), 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  25. Bryce Goodman and Seth Flaxman. 2017. European Union regulations on algorithmic decision-making and a "right to explanation". AI magazine 38, 3 (2017), 50--57.Google ScholarGoogle Scholar
  26. Google. 2020. Digital Wellbeing. https://wellbeing.google/Google ScholarGoogle Scholar
  27. Google. 2020. Google Account. https://myaccount.google.comGoogle ScholarGoogle Scholar
  28. Trusted Computing Group. 2020. About TCG. https://trustedcomputinggroup.org/about/Google ScholarGoogle Scholar
  29. AI Hleg. 2019. Ethics guidelines for trustworthy AI. B-1049 Brussels (2019).Google ScholarGoogle Scholar
  30. Paola Inverardi. 2019. Ethics and Privacy in Autonomous Systems A Software Exoskeleton to Empower the User. In International Workshop on Software Engineering for Resilient Systems. Springer, 3--8.Google ScholarGoogle ScholarCross RefCross Ref
  31. Paola Inverardi. 2019. The European perspective on responsible computing. Commun. ACM 62, 4 (2019), 64--64.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Ganesh Iyer, David Soberman, and J Miguel Villas-Boas. 2005. The targeting of advertising. Marketing Science 24, 3 (2005), 461--476.Google ScholarGoogle ScholarCross RefCross Ref
  33. Brenda Laurel and S Joy Mountford. 1990. The art of human-computer interface design. Addison-Wesley Longman Publishing Co., Inc.Google ScholarGoogle Scholar
  34. Statista. 2020. Number of smartphone users worldwide from 2016 to 2021. https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/Google ScholarGoogle Scholar
  35. Apple Support. 2020. Change common iPad settings. https://support.apple.com/guide/ipad/change-common-settings-ipad79520415/ipadosGoogle ScholarGoogle Scholar
  36. Apple Support. 2020. Change common iPhone settings. https://support.apple.com/guide/iphone/change-common-settings-iph70825e5ae/iosGoogle ScholarGoogle Scholar
  37. Wan-Shiou Yang, Jia-Ben Dia, Hung-Chi Cheng, and Hsing-Tzu Lin. 2006. Mining social networks for targeted advertising. In Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), Vol. 6. IEEE, 137a--137a.Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    MOBILESoft '20: Proceedings of the IEEE/ACM 7th International Conference on Mobile Software Engineering and Systems
    July 2020
    158 pages
    ISBN:9781450379595
    DOI:10.1145/3387905
    • General Chair:
    • David Lo,
    • Program Chairs:
    • Leonardo Mariani,
    • Ali Mesbah

    Copyright © 2020 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 7 October 2020

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • short-paper

    Upcoming Conference

    ICSE 2025

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader