skip to main content
10.1145/3538969.3543790acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Android Permission Manager, Visual Cues, and their Effect on Privacy Awareness and Privacy Literacy

Published: 23 August 2022 Publication History

Abstract

Android applications request specific permissions from users during the installations to perform required functionalities by accessing system resources and personal information. Usually, users must approve the permissions requested by applications (apps) during the installation process and before the apps can collect privacy- or security-relevant information. However, recent studies have shown that users are overwhelmed with the information provided in privacy policies and do not understand permission requests and which functionalities are necessary for certain applications. Hereby, the collection of personal information remains mostly hidden, as the task of verifying to which information different apps have access to can be very complicated. Therefore, it is necessary to develop frameworks and apps that enable the user to perform informed decisions about apps’ run-time permission access to facilitate the control over sensitive information collected by various apps on smartphones. In this work, we conducted an online study with 70 participants who interacted with a mockup app that enables advanced control over permission requests. The selected permissions are based on the apps’ run-time permission access patterns and explanations, and commonly known visual cues are used to facilitate the user’s understanding and privacy-conscious decision making. Furthermore, the effects of perceived control over information sharing and privacy awareness are examined in combination with the permission manager mockup app to investigate if increased control over information sharing increases general privacy awareness.
Our results show an interplay between increased control and privacy awareness when explanations and common visual cues are presented to the user. However, the direction of the interplay between increased control and privacy awareness was surprising. Privacy awareness dropped for the experimental group, which received advanced explanations and visual nudges for privacy-conscious decision making. Interestingly privacy awareness significantly increased for the control group, which only received a plain privacy nudge. Therefore, we suggest that increased control over information sharing does not necessarily lead to improved privacy-decision making, and privacy by default might be a more effective design choice.

References

[1]
2020. Mobile Security Framework (MobSF). https://github.com/MobSF/Mobile-Security-Framework-MobSF
[2]
Alessandro Acquisti, Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman Sadeh, Florian Schaub, Manya Sleeper, 2017. Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Computing Surveys (CSUR) 50, 3 (2017), 1–41.
[3]
Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2015. Privacy and human behavior in the age of information. Science 347, 6221 (2015), 509–514.
[4]
José Alemany, Elena Del Val, and Ana García-Fornes. 2020. Empowering Users Regarding the Sensitivity of their Data in Social Networks through Nudge Mechanisms. In HICSS. 1–10.
[5]
Hazim Almuhimedi. 2017. Helping Smartphone Users Manage their Privacy through Nudges. (2017).
[6]
Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Faith Cranor, and Yuvraj Agarwal. 2015. Your location has been shared 5,398 times! A field study on mobile app privacy nudging. In Proceedings of the 33rd annual ACM conference on human factors in computing systems. 787–796.
[7]
Fatma Alrayes and Alia Abdelmoty. 2016. Towards location privacy awareness on geo-social networks. In 2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST). IEEE, 105–114.
[8]
Susanne Barth, Menno DT de Jong, Marianne Junger, Pieter H Hartel, and Janina C Roppelt. 2019. Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics and informatics 41 (2019), 55–69.
[9]
Kristoffer Bergram, Valéry Bezençon, Paul Maingot, Tony Gjerlufsen, and Adrian Holzer. 2020. Digital Nudges for Privacy Awareness: From consent to informed consent?. In ECIS.
[10]
Matthijs Blankers, Daan van der Gouwe, Lavinia Stegemann, and Laura Smit-Rigter. 2021. Changes in Online Psychoactive Substance Trade via Telegram during the COVID-19 Pandemic. European Addiction Research(2021), 1–6.
[11]
Christoph Bösch, Benjamin Erb, Frank Kargl, Henning Kopp, and Stefan Pfattheicher. 2016. Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns.Proc. Priv. Enhancing Technol. 2016, 4 (2016), 237–254.
[12]
Julia Chantal, Serge Hercberg, World Health Organization, 2017. Development of a new front-of-pack nutrition label in France: the five-colour Nutri-Score. Public Health Panorama 3, 04 (2017), 712–725.
[13]
Rachna Dhamija, J Doug Tygar, and Marti Hearst. 2006. Why phishing works. In Proceedings of the SIGCHI conference on Human Factors in computing systems. 581–590.
[14]
Nicolás E Díaz Ferreyra, Tobias Kroll, Esma Aïmeur, Stefan Stieglitz, and Maritta Heisel. 2020. Preventative Nudges: Introducing Risk Cues for Supporting Online Self-Disclosure Decisions. Information 11, 8 (2020), 399.
[15]
Majid Hatamian. 2020. Engineering privacy in smartphone apps: A technical guideline catalog for app developers. IEEE Access 8(2020), 35429–35445.
[16]
M. Hatamian. 2020. Engineering Privacy in Smartphone Apps: A Technical Guideline Catalog for App Developers. IEEE Access 8(2020), 35429–35445.
[17]
Majid Hatamian, Nurul Momen, Lothar Fritsch, and Kai Rannenberg. 2019. A multilateral privacy impact analysis method for android apps. In Annual Privacy Forum. Springer, 87–106.
[18]
Majid Hatamian, Jetzabel Serna, and Kai Rannenberg. 2019. Revealing the unrevealed: Mining smartphone users privacy perception on app markets. Computers & Security 83(2019), 332–353.
[19]
Majid Hatamian, Samuel Wairimu, Nurul Momen, and Lothar Fritsch. 2021. A privacy and security analysis of early-deployed COVID-19 contact tracing Android apps. Empirical Software Engineering 26, 3 (2021), 1–51.
[20]
Majid Hatamian, Samuel Wairimu, Nurul Momen, and Lothar Fritsch. 2021. A privacy and security analysis of early-deployed COVID-19 contact tracing Android apps. Empirical Software Engineering 26, 3 (2021), 1–51.
[21]
Patrick Gage Kelley, Lorrie Faith Cranor, and Norman Sadeh. 2013. Privacy as part of the app decision-making process. In Proceedings of the SIGCHI conference on human factors in computing systems. 3393–3402.
[22]
Jennifer King. 2012. How Come I’m Allowing Strangers to Go Through My Phone? Smartphones and Privacy Expectations.Smartphones and Privacy Expectations.(March 15, 2012) (2012).
[23]
Spyros Kokolakis. 2017. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & security 64(2017), 122–134.
[24]
Lydia Kraus, Ina Wechsung, and Sebastian Möller. 2014. Using statistical information to communicate android permission risks to users. In 2014 Workshop on Socio-Technical Aspects in Security and Trust. IEEE, 48–55.
[25]
Tobias Kroll and Stefan Stieglitz. 2021. Digital nudging and privacy: improving decisions about self-disclosure in social networks. Behaviour & Information Technology 40, 1 (2021), 1–19.
[26]
Rui Li, Wenrui Diao, Zhou Li, Shishuai Yang, Shuang Li, and Shanqing Guo. 2021. Android Custom Permissions Demystified: A Comprehensive Security Evaluation. IEEE Transactions on Software Engineering(2021).
[27]
Helia Marreiros, Mirco Tonin, Michael Vlassopoulos, and MC Schraefel. 2017. “Now that you mention it”: A survey experiment on information, inattention and online privacy. Journal of Economic Behavior & Organization 140 (2017), 1–17.
[28]
Philipp K Masur, Doris Teutsch, and Sabine Trepte. 2017. Development and Validation of the Online Privacy Literacy Scale (OPLIS). Diagnostica 63, 4 (2017), 256–268.
[29]
Philipp K Masur, Doris Teutsch, and Sabine Trepte. 2017. Entwicklung und Validierung der Online-Privatheitskompetenzskala (OPLIS). Diagnostica (2017).
[30]
Tobias Mirsch, Christiane Lehrer, and Reinhard Jung. 2017. Digital nudging: Altering user behavior in digital environments. Proceedings der 13. Internationalen Tagung Wirtschaftsinformatik (WI 2017) (2017), 634–648.
[31]
Nurul Momen, Majid Hatamian, and Lothar Fritsch. 2019. Did app privacy improve after the GDPR?IEEE Security & Privacy 17, 6 (2019), 10–20.
[32]
Jonathan A Obar and Anne Oeldorf-Hirsch. 2020. The biggest lie on the internet: Ignoring the privacy policies and terms of service policies of social networking services. Information, Communication & Society 23, 1 (2020), 128–147.
[33]
Irene Pollach. 2006. Privacy statements as a means of uncertainty reduction in WWW interactions. Journal of Organizational and End User Computing (JOEUC) 18, 1(2006), 23–49.
[34]
Stefanie Pötzsch. 2008. Privacy awareness: A means to solve the privacy paradox?. In IFIP Summer School on the Future of Identity in the Information Society. Springer, 226–236.
[35]
Alison DeNisco Rayome. 2021. This iPhone setting can stop ads from following you across the web. https://www.cnet.com/tech/services-and-software/iphone-privacy-setting-stop-ads-tracking-you/
[36]
Tanusree Sharma and Masooda Bashir. 2020. Are PETs (Privacy Enhancing Technologies) Giving Protection for Smartphones?–A Case Study. arXiv preprint arXiv:2007.04444(2020).
[37]
Fuming Shih, Ilaria Liccardi, and Daniel Weitzner. 2015. Privacy tipping points in smartphones privacy preferences. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 807–816.
[38]
H Jeff Smith, Sandra J Milberg, and Sandra J Burke. 1996. Information privacy: Measuring individuals’ concerns about organizational practices. MIS quarterly (1996), 167–196.
[39]
Borce Stojkovski, Gabriele Lenzini, and Vincent Koenig. 2021. ” I personally relate it to the traffic light” a user study on security & privacy indicators in a secure email system committed to privacy by default. In Proceedings of the 36th Annual ACM Symposium on Applied Computing. 1235–1246.
[40]
Ali Sunyaev, Tobias Dehling, Patrick L Taylor, and Kenneth D Mandl. 2015. Availability and quality of mobile health app privacy policies. Journal of the American Medical Informatics Association 22, e1(2015), e28–e33.
[41]
Joshua Tan, Khanh Nguyen, Michael Theodorides, Heidi Negrón-Arroyo, Christopher Thompson, Serge Egelman, and David Wagner. 2014. The effect of developer-specified explanations for permission requests on smartphone user behavior. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 91–100.
[42]
RH Thaler and CR Sunstein. 2009. Nudge: Improving Decisions About Health, Wealth, and Happiness. Penguin Books. (2009).
[43]
Kometh Thawanyarat, Shannon Francis, Trudy Kim, Connor Arquette, Shane Morrison, and Rahim Nazerali. 2022. The Zoom Effect: A Google Trends Analysis. Aesthetic surgery journal 42, 1 (2022), NP76–NP82.
[44]
Sabine Trepte, Doris Teutsch, Philipp K Masur, Carolin Eicher, Mona Fischer, Alisa Hennhöfer, and Fabienne Lind. 2015. Do people know about privacy and data protection strategies? Towards the “Online Privacy Literacy Scale”(OPLIS). In Reforming European data protection law. Springer, 333–365.
[45]
Heng Xu, Hock-Hai Teo, Bernard CY Tan, and Ritu Agarwal. 2012. Research note—effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: a study of location-based services. Information Systems Research 23, 4 (2012), 1342–1363.
[46]
Bo Zhang and Heng Xu. 2016. Privacy nudges for mobile applications: Effects on the creepiness emotion and privacy attitudes. In Proceedings of the 19th ACM conference on computer-supported cooperative work & social computing. 1676–1690.

Cited By

View all
  • (2024)How Much is Your Instagram Data Worth? Economic Perspective of Privacy in the Social Media ContextPrivacy and Identity Management. Sharing in a Digital World10.1007/978-3-031-57978-3_19(292-308)Online publication date: 23-Apr-2024
  • (2023)What is Your Location Privacy Worth? Monetary Valuation of Different Location Types and Privacy Influencing FactorsProceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3558482.3590180(19-29)Online publication date: 29-May-2023
  • (2023)Thematic exploration of online privacy literacy and examination of its future agendaBehaviour & Information Technology10.1080/0144929X.2023.228828543:15(3893-3921)Online publication date: 3-Dec-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security
August 2022
1371 pages
ISBN:9781450396707
DOI:10.1145/3538969
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 August 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Permission request analysis
  2. permission manager
  3. privacy awareness
  4. privacy literacy
  5. privacy nudges

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ARES 2022

Acceptance Rates

Overall Acceptance Rate 228 of 451 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)68
  • Downloads (Last 6 weeks)3
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)How Much is Your Instagram Data Worth? Economic Perspective of Privacy in the Social Media ContextPrivacy and Identity Management. Sharing in a Digital World10.1007/978-3-031-57978-3_19(292-308)Online publication date: 23-Apr-2024
  • (2023)What is Your Location Privacy Worth? Monetary Valuation of Different Location Types and Privacy Influencing FactorsProceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3558482.3590180(19-29)Online publication date: 29-May-2023
  • (2023)Thematic exploration of online privacy literacy and examination of its future agendaBehaviour & Information Technology10.1080/0144929X.2023.228828543:15(3893-3921)Online publication date: 3-Dec-2023
  • (2023)What is Your Information Worth? A Systematic Analysis of the Endowment Effect of Different Data TypesSecure IT Systems10.1007/978-3-031-47748-5_13(223-242)Online publication date: 16-Nov-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media