skip to main content
10.1145/3558482.3590180acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

What is Your Location Privacy Worth? Monetary Valuation of Different Location Types and Privacy Influencing Factors

Published: 28 June 2023 Publication History

Abstract

Nowadays, many apps use location data to estimate the user's behavior for targeted advertising, predicting significant locations, personal preferences, state of health, and sports activities. Users of location-based services are often left with no other choice than to accept or reject location tracking when they want to use various applications. Especially, users with higher privacy concerns may reduce the frequency of location tracking by turning it off in the settings. However, most users are unaware that many applications installed on their phones are continuously tracking them. Therefore, this study attempts to answer how (obviously) being tracked over one-week influences a user's privacy concerns. The study was implemented using an iOS app, which participants could install on their smartphones. Moreover, over one week, the participants were requested to answer daily mini-questionnaires about how much they would be willing to pay for the protection of their location information on a monthly basis and how much money they were willing to accept in exchange for their location information. Hereby, the context was an important criterion to determine how the monetary values vary among different location types for, among others, home location, work location, and meeting family and friends. The participants (N=51) interacted with the app on a daily basis by filling out various daily mini-surveys based on their significant locations visited. The results show a significant difference between the monetary valuating of willingness to pay and to accept for all location types except work location and sharing scenarios contributing to further empirical evidence for the endowment effect. The obvious fact of continuously being tracked did not increase the privacy concern of participants.

Supplementary Material

MP4 File (wisecfp041.mp4)
The study explores how being tracked for one week affects users' privacy concerns. Participants used an iOS app to answer daily mini-questionnaires on their willingness to pay or accept money for their location data. The study found that willingness to pay/accept varied by location type and sharing scenarios, and there was a significant difference between the two for all locations except work. The study also showed that being tracked did not increase users' privacy concerns

References

[1]
Alessandro Acquisti and Jens Grossklags. 2005. Privacy and rationality in individual decision making. IEEE security & privacy, Vol. 3, 1 (2005), 26--33.
[2]
Alessandro Acquisti, Curtis Taylor, and Liad Wagman. 2016. The economics of privacy. Journal of economic Literature, Vol. 54, 2 (2016), 442--92.
[3]
Hunt Allcott, Luca Braghieri, Sarah Eichmeyer, and Matthew Gentzkow. 2020. The welfare effects of social media. American Economic Review, Vol. 110, 3 (2020), 629--76.
[4]
Apple. 2021. Significant-Change Location Service Kernel" Description. https://developer.apple.com/documentation/corelocation/getting_the_user_s_location/using_the_significant-change_location_service. Online; accessed 29 October 2021.
[5]
Susan Athey, Christian Catalini, and Catherine Tucker. 2017. The digital privacy paradox: Small money, small costs, small talk. Technical Report. National Bureau of Economic Research.
[6]
Wojciech Bizon and Andrzej Poszewiecki. 2016. The willingness to trade privacy in the context of WTA and WTP. International Journal of Trade, Economics and Finance, Vol. 7, 4 (2016), 121--124.
[7]
Lee J Cronbach. 1951. Coefficient alpha and the internal structure of tests. psychometrika, Vol. 16, 3 (1951), 297--334.
[8]
JF Hair, WC Black, BJ Babin, and RE Anderson. 2010. Multivariate data analysis: Pearson College division. Person: London, UK (2010).
[9]
Joseph F Hair, Christian M Ringle, Siegfried P Gudergan, Andreas Fischer, Christian Nitzl, and Con Menictas. 2019. Partial least squares structural equation modeling-based discrete choice modeling: an illustration in modeling retailer choice. Business Research, Vol. 12 (2019), 115--142.
[10]
Joseph F Hair Jr, G Tomas M Hult, Christian M Ringle, Marko Sarstedt, Nicholas P Danks, and Soumya Ray. 2021. Partial least squares structural equation modeling (PLS-SEM) using R: A workbook. Springer Nature.
[11]
Joe F Hair Jr, Lucy M Matthews, Ryan L Matthews, and Marko Sarstedt. 2017. PLS-SEM or CB-SEM: updated guidelines on which method to use. International Journal of Multivariate Data Analysis, Vol. 1, 2 (2017), 107--123.
[12]
Jennifer Jardine, Jonathan Fisher, and Benjamin Carrick. 2015. Apple's ResearchKit: smart data collection for the smartphone era?, 294--296 pages.
[13]
Charles I Jones and Christopher Tonetti. 2020. Nonrivalry and the Economics of Data. American Economic Review, Vol. 110, 9 (2020), 2819--58.
[14]
Daniel Kahneman and Amos Tversky. 2013. Prospect theory: An analysis of decision under risk. In Handbook of the fundamentals of financial decision making: Part I. World Scientific, 99--127.
[15]
Chunnu Khawas and Pritam Shah. 2018. Application of firebase in android app development-a study. International Journal of Computer Applications, Vol. 179, 46 (2018), 49--53.
[16]
Maike Kuckertz and Burkhardt Funk. 2015. Datenschutzbedenken in Sozialen Netzen--ein Strukturgleichungsmodell. (2015).
[17]
Xiao-Bai Li, Xiaoping Liu, and Luvai Motiwalla. 2021. Valuing Personal Data with Privacy Consideration. Decision Sciences, Vol. 52, 2 (2021), 393--426.
[18]
M Lieberman. 2015. Pricing research: A new take on the Van Westendorp model. Quirk's Marketing Research Review, Vol. 2 (2015), 1--5.
[19]
Stan Lipovetsky, Shon Magnan, and Andrea Zanetti-Polzi. 2011. Pricing models in marketing research. (2011).
[20]
Naresh K Malhotra, Sung S Kim, and James Agarwal. 2004. Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research, Vol. 15, 4 (2004), 336--355.
[21]
Babak Naderi, Tim Polzehl, André Beyer, Tibor Pilz, and Sebastian Möller. 2014. Crowdee: mobile crowdsourcing micro-task platform for celebrating the diversity of languages. In Fifteenth Annual Conference of the International Speech Communication Association.
[22]
Margaretha Ohyver, Jurike V Moniaga, Iwa Sungkawa, Bonifasius Edwin Subagyo, and Ian Argus Chandra. 2019. The comparison firebase realtime database and MySQL database performance using wilcoxon signed-rank test. Procedia Computer Science, Vol. 157 (2019), 396--405.
[23]
Charles R Plott and Kathryn Zeiler. 2005. The willingness to pay--willingness to accept gap, the "endowment effect," subject misconceptions, and experimental procedures for eliciting valuations. American Economic Review, Vol. 95, 3 (2005), 530--545.
[24]
M Poikela and Felix Kaiser. 2016. "it is a topic that confuses me'--privacy perceptions in usage of location-based applications. In European Workshop on Usable Security (EuroUSEC).
[25]
Maija Poikela and Eran Toch. 2017. Understanding the valuation of location privacy: a crowdsourcing-based approach. In Proceedings of the 50th Hawaii International Conference on System Sciences.
[26]
Jeffrey Prince and Scott Wallsten. 2020. How much is privacy worth around the world and across platforms?. In TPRC48: The 48th Research Conference on Communication, Information and Internet Policy.
[27]
Vera Schmitt, James Nicholson, and Sebastian Möller. 2022a. Is Your Surveillance Camera App Watching You? A Privacy Analysis. (2022).
[28]
Vera Schmitt, Maija Poikela, and Sebastian Möller. 2021. Willingness to Pay for the Protection of Different Data Types. Mensch und Computer 2021-Workshopband (2021).
[29]
Vera Schmitt, Maija Poikela, and Sebastian Möller. 2022b. Android Permission Manager, Visual Cues, and their Effect on Privacy Awareness and Privacy Literacy. In Proceedings of the 17th International Conference on Availability, Reliability and Security. 1--12.
[30]
Cornelia Sindermann, Haibo Yang, Shixin Yang, Jon D Elhai, and Christian Montag. 2022. Willingness to accept (WTA), willingness to pay (WTP), and the WTA/WTP disparity in Chinese social media platforms: Descriptive statistics and associations with personality and social media use. Acta psychologica, Vol. 223 (2022), 103462.
[31]
H Jeff Smith, Sandra J Milberg, and Sandra J Burke. 1996. Information privacy: Measuring individuals' concerns about organizational practices. MIS quarterly (1996), 167--196.
[32]
Daniel J Solove. 2021. The myth of the privacy paradox. Geo. Wash. L. Rev., Vol. 89 (2021), 1.
[33]
Sarah Spiekermann, Alessandro Acquisti, Rainer Böhme, and Kai-Lung Hui. 2015. The challenges of personal data markets and privacy. Electronic markets, Vol. 25, 2 (2015), 161--167.
[34]
Yaojia Tang and Luna Wang. 2021. How Chinese Web Users Value Their Personal Information: An Empirical Study on WeChat Users. Psychology Research and Behavior Management, Vol. 14 (2021), 987.
[35]
Christina Tikkinen-Piri, Anna Rohunen, and Jouni Markkula. 2018. EU General Data Protection Regulation: Changes and implications for personal data collecting companies. Computer Law & Security Review, Vol. 34, 1 (2018), 134--153.
[36]
Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, Janice Y Tsai, Patrick Gage Kelley, James Springfield, Lorrie Cranor, Jason Hong, and Norman Sadeh. 2010. Empirical models of privacy in location sharing. In Proceedings of the 12th ACM international conference on Ubiquitous computing. 129--138.
[37]
Angela G Winegar and Cass R Sunstein. 2019. How much is data privacy worth? a preliminary investigation. Journal of Consumer Policy, Vol. 42, 3 (2019), 425--440.
[38]
Heng Xu, Sumeet Gupta, Mary Beth Rosson, and John M Carroll. 2012. Measuring mobile users' concerns for information privacy. (2012). io

Cited By

View all
  • (2024)Insights from an Experiment Crowdsourcing Data from Thousands of US Amazon Users: The importance of transparency, money, and data useProceedings of the ACM on Human-Computer Interaction10.1145/36870058:CSCW2(1-48)Online publication date: 8-Nov-2024
  • (2024)Evaluating the Privacy Valuation of Personal Data on SmartphonesProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36785098:3(1-33)Online publication date: 9-Sep-2024
  • (2024)A privacy-preserving location data collection framework for intelligent systems in edge computingAd Hoc Networks10.1016/j.adhoc.2024.103532161(103532)Online publication date: Aug-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSec '23: Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks
May 2023
394 pages
ISBN:9781450398596
DOI:10.1145/3558482
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 June 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. economics of privacy
  2. location tracking
  3. privacy concern
  4. usable privacy
  5. wtp and wta

Qualifiers

  • Research-article

Funding Sources

Conference

WiSec '23

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)71
  • Downloads (Last 6 weeks)6
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Insights from an Experiment Crowdsourcing Data from Thousands of US Amazon Users: The importance of transparency, money, and data useProceedings of the ACM on Human-Computer Interaction10.1145/36870058:CSCW2(1-48)Online publication date: 8-Nov-2024
  • (2024)Evaluating the Privacy Valuation of Personal Data on SmartphonesProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36785098:3(1-33)Online publication date: 9-Sep-2024
  • (2024)A privacy-preserving location data collection framework for intelligent systems in edge computingAd Hoc Networks10.1016/j.adhoc.2024.103532161(103532)Online publication date: Aug-2024
  • (2024)How Much is Your Instagram Data Worth? Economic Perspective of Privacy in the Social Media ContextPrivacy and Identity Management. Sharing in a Digital World10.1007/978-3-031-57978-3_19(292-308)Online publication date: 23-Apr-2024

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media