ABSTRACT
Nowadays, mobile users are constantly being connected and increasingly asked to express their personal preferences in the digital world. User preferences deal with simple device settings options, like notification alarms, as well as relevant ethical choices relating to the user behavior, privacy ones included (e.g., concerning the unauthorized disclosure and mining of personal data, as well as the access to restricted resources). All these preferences define the user, they are the building blocks of her digital identity and will be increasingly important given the growing rise of autonomous technologies and their ethical implications. The settings that enable these preferences are often hard to locate and hard to understand, even in popular apps and operating systems. Moreover, they can expose privacy, be employed for profiling or exploited for malicious activities. In this landscape, we devise the introduction of a Personal Preferences Automation Module (PPAM) capable of automatically inferring, applying and enforcing user choices in multiple scenarios ranging from speeding up simple time consuming tasks, to managing sensitive ethical choices. The wide range of sensors and devices that can be found in the mobile domain makes it a privileged context in which to employ the proposed module. In this paper, we present two application scenarios and describe the proposed approach at work on them.
- 2018. European Group on Ethics in Science and New Technologies. Statement on Artificial Intelligence, Robotics and 'Autonomous' Systems. https://ec.europa.eu/research/ege/pdf/ege_ai_statement_2018.pdf.Google Scholar
- Chadia Abras, Diane Maloney-Krichmar, Jenny Preece, et al. 2004. User-centered design. Bainbridge, W. Encyclopedia of Human-Computer Interaction. Thousand Oaks: Sage Publications 37, 4 (2004), 445--456.Google Scholar
- Alessandro Acquisti, Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman Sadeh, Florian Schaub, Manya Sleeper, and et al. 2017. Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online. ACM Comput. Surv. 50, 3, Article 44 (Aug. 2017), 41 pages.Google Scholar
- Christoph Anderson, Isabel Fernanda Hübener, Ann-Kathrin Seipp, Sandra Ohly, Klaus David, and Veljko Pejovic. 2018. A Survey of Attention Management Systems in Ubiquitous Computing Environments. IMWUT 2, 2 (2018), 58:1--58:27.Google Scholar
- APP Annie. 2020. The State of Mobile in 2020: The Key Stats You Need to Know. https://www.appannie.com/go/state-of-mobile-2020Google Scholar
- Apple. 2020. Apple ID. https://appleid.apple.comGoogle Scholar
- Apple. 2020. Human Interface Guidelines. https://developer.apple.com/design/human-interface-guidelines/ios/app-architecture/settings/Google Scholar
- Apple. 2020. Screen Time. https://support.apple.com/en-us/HT208982Google Scholar
- Marco Autili, Davide Di Ruscio, Paola Inverardi, Patrizio Pelliccione, and Massimo Tivoli. 2019. A Software Exoskeleton to Protect and Support Citizen's Ethics and Privacy in the Digital World. IEEE Access 7 (2019), 62011--62021.Google ScholarCross Ref
- Edmond Awad, Sohan Dsouza, Richard Kim, Jonathan Schulz, Joseph Henrich, Azim Shariff, Jean-François Bonnefon, and Iyad Rahwan. 2018. The moral machine experiment. Nature 563, 7729 (2018), 59--64.Google Scholar
- Sundeep Bajikar. 2002. Trusted platform module (tpm) based security on notebook pcs-white paper. Mobile Platforms Group Intel Corporation (2002), 1--20.Google Scholar
- Rainer Böhme and Jens Grossklags. 2011. The security cost of cheap user interaction. In Proceedings of the 2011 New Security Paradigms Workshop. ACM, 67--82.Google ScholarDigital Library
- J. Peter Burgess, L. Floridi, A. Pols, and J. van den Hoven. 2018. Towards a digital ethics - EDPS Ethics Advisory Group. https://edps.europa.eu/sites/edp/files/publication/18-01-25_eag_report_en.pdf.Google Scholar
- Carole Cadwalladr and Emma Graham-Harrison. 2018. Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. The guardian 17 (2018), 22.Google Scholar
- Yi Chen, Mingming Zha, Nan Zhang, Dandan Xu, Qianqian Zhao, Xuan Feng, Kan Yuan, Fnu Suya, Yuan Tian, Kai Chen, et al. 2019. Demystifying Hidden Privacy Settings in Mobile Apps. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 570--586.Google Scholar
- European Commission. [n.d.]. Statement on artficial intelligence, robotics and 'autonomous' systems. https://ec.europa.eu/research/ege/pdf/ege_ai_statement_2018.pdfGoogle Scholar
- Stefania Costantini, Giovanni De Gasperis, and Patrizio Migliarini. 2019. Multiagent System Engineering for Emphatic Human-Robot Interaction. In 2019 IEEE Second International Conference on Artificial Intelligence and Knowledge Engineering (AIKE). IEEE, 36--42.Google Scholar
- Android Developers. [n.d.]. Android Settings Menu. https://source.android.com/devices/tech/settings/Google Scholar
- Peter Eckersley. 2010. How unique is your web browser?. In International Symposium on Privacy Enhancing Technologies Symposium. Springer, 1--18.Google ScholarDigital Library
- EDPS. 2015. Leading by example, The EDPS Strategy 2015-2019. https://edps.europa.eu/sites/edp/files/publication/15-07-30_strategy_2015_2019_update_en.pdf.Google Scholar
- Empatica. 2020. Embrace2. https://www.empatica.com/embrace2/Google Scholar
- Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, and David A. Wagner. 2011. Android permissions demystified. In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17--21, 2011. 627--638.Google Scholar
- Luciano Floridi. 2015. Luciano Floridi---Commentary on the Onlife Manifesto. In The onlife manifesto. Springer, Cham, 21--23.Google Scholar
- Luciano Floridi. 2018. Soft Ethics and the Governance of the Digital. Philosophy & Technology 31, 1 (2018), 1--8.Google ScholarCross Ref
- Bryce Goodman and Seth Flaxman. 2017. European Union regulations on algorithmic decision-making and a "right to explanation". AI magazine 38, 3 (2017), 50--57.Google Scholar
- Google. 2020. Digital Wellbeing. https://wellbeing.google/Google Scholar
- Google. 2020. Google Account. https://myaccount.google.comGoogle Scholar
- Trusted Computing Group. 2020. About TCG. https://trustedcomputinggroup.org/about/Google Scholar
- AI Hleg. 2019. Ethics guidelines for trustworthy AI. B-1049 Brussels (2019).Google Scholar
- Paola Inverardi. 2019. Ethics and Privacy in Autonomous Systems A Software Exoskeleton to Empower the User. In International Workshop on Software Engineering for Resilient Systems. Springer, 3--8.Google ScholarCross Ref
- Paola Inverardi. 2019. The European perspective on responsible computing. Commun. ACM 62, 4 (2019), 64--64.Google ScholarDigital Library
- Ganesh Iyer, David Soberman, and J Miguel Villas-Boas. 2005. The targeting of advertising. Marketing Science 24, 3 (2005), 461--476.Google ScholarCross Ref
- Brenda Laurel and S Joy Mountford. 1990. The art of human-computer interface design. Addison-Wesley Longman Publishing Co., Inc.Google Scholar
- Statista. 2020. Number of smartphone users worldwide from 2016 to 2021. https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/Google Scholar
- Apple Support. 2020. Change common iPad settings. https://support.apple.com/guide/ipad/change-common-settings-ipad79520415/ipadosGoogle Scholar
- Apple Support. 2020. Change common iPhone settings. https://support.apple.com/guide/iphone/change-common-settings-iph70825e5ae/iosGoogle Scholar
- Wan-Shiou Yang, Jia-Ben Dia, Hung-Chi Cheng, and Hsing-Tzu Lin. 2006. Mining social networks for targeted advertising. In Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), Vol. 6. IEEE, 137a--137a.Google ScholarDigital Library
Recommendations
POSTER: Preserving privacy and accountability for personal devices
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityUsing personal mobile devices for work gave rise to a trend called "bring your own device", or BYOD. BYOD brings a productivity boost for employees, but also headaches for employers: on the one hand, the business has a legitimate interest in monitoring ...
Reasoning with imprecise privacy preferences
FSE 2016: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software EngineeringUser reluctance and context-dependent factors during information disclosure imply that people cannot always be counted on to indicate their appropriate privacy preference. This phenomenon is the well-known 'privacy paradox', which shows that users of ...
Did You Want Privacy With That?: Personal Data Protection in Mobile Devices
Smartphones and mobile devices make desktops and laptops seem clunky in comparison, but do they protect privacy? Here, the author examines the mechanisms for mobile device privacy, from operating system approaches to what users should know about risks.
Comments