skip to main content
research-article
Open access

Understanding Users' Perspectives on Location Privacy Management on iPhones

Published: 24 September 2024 Publication History

Abstract

As the number of applications installed on smartphones continues to grow, the task of effectively managing location privacy has become increasingly complex. In this paper, we explore the factors that influence users' privacy-preserving intentions and contrast them with their actual behaviours. In addition, we compare location privacy concerns across different apps investigating the impact of app-specific features on the willingness to disclose location information. Our findings highlight significant challenges in privacy management due to privacy fatigue and perceived usability. Furthermore, participants raised the importance of more uniform standards regarding location privacy settings across various applications, calling for more detailed and interactive well-informed consent processes that highlight the risks instead of the benefits of disclosing location information. This research contributes important insights towards the development of more effective privacy settings that can foster increased user engagement in managing location privacy on smartphones.

References

[1]
Khaoula Akdim, Luis V Casaló, and Carlos Flavián. 2022. The role of utilitarian and hedonic aspects in the continuance intention to use social mobile apps. Journal of Retailing and Consumer Services, Vol. 66 (2022), 102888.
[2]
Adi Alsyouf, Abdalwali Lutfi, Mohammad Al-Bsheish, Mu'taman Jarrar, Khalid Al-Mugheed, Mohammed Amin Almaiah, Fahad Nasser Alhazmi, Ra'ed Masa'deh, Rami J Anshasi, and Abdallah Ashour. 2022. Exposure detection applications acceptance: The case of COVID-19. International Journal of Environmental Research and Public Health, Vol. 19, 12 (2022), 7307.
[3]
Adi Alsyouf, Abdalwali Lutfi, Nizar Alsubahi, Fahad Nasser Alhazmi, Khalid Al-Mugheed, Rami J Anshasi, Nora Ibrahim Alharbi, and Moteb Albugami. 2023. The use of a Technology Acceptance Model (TAM) to predict patients? usage of a personal health record system: The role of security, privacy, and usability. International journal of environmental research and public health, Vol. 20, 2 (2023), 1347.
[4]
Ionut Andone, Konrad Blaszkiewicz, Matthias Böhmer, and Alexander Markowetz. 2017. Impact of location-based games on phone usage and movement: A case study on Pokémon GO. In Proceedings of the 19th International Conference on Human-Computer Interaction with Mobile Devices and Services. 1--8.
[5]
Corey M Angst and Ritu Agarwal. 2009. Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion. MIS quarterly (2009), 339--370.
[6]
David G Balash, Mir Masood Ali, Xiaoyuan Wu, Chris Kanich, and Adam J Aviv. 2022. Longitudinal analysis of privacy labels in the apple app store. arXiv preprint arXiv:2206.02658 (2022).
[7]
Miriam Bartsch and Tobias Dienlin. 2016. Control your Facebook: An analysis of online privacy literacy. Computers in Human Behavior, Vol. 56 (2016), 147--154.
[8]
Scott Bay and Jason Cohen. 2023. How to Turn Off Location Services and Stop Your iPhone Apps From Tracking You. https://au.pcmag.com/mobile-phones/57573/how-to-turn-off-location-services-and-stop-your-iphone-apps-from-tracking-you
[9]
Laura F Bright, Hayoung Sally Lim, and Kelty Logan. 2021. 'Should I Post or Ghost'?: Examining how privacy concerns impact social media engagement in US consumers. Psychology & Marketing, Vol. 38, 10 (2021), 1712--1722.
[10]
Allison J Brown. 2020. 'Should I stay or should I leave'?: Exploring (dis) continued Facebook use after the Cambridge Analytica scandal. Social media society, Vol. 6, 1 (2020), 2056305120913884.
[11]
buildfire. 2024. Mobile App Download Statistics & Usage Statistics. https://buildfire.com/app-statistics/#: :text=Research%20shows%20that%20there%20are,and%2030%20apps%20per%20month.
[12]
Matthew Burkholder and Rachel Greenstadt. 2012. Privacy in online review sites. In 2012 IEEE Symposium on Security and Privacy Workshops. IEEE, 45--52.
[13]
Jeng-Chung Chen and Quang-An Ha. 2019. Factors affecting the continuance to share location on social networking sites: The influence of privacy concern, trust, benefit and the moderating role of positive feedback and perceived promotion innovativeness. Contemporary Management Research, Vol. 15, 2 (2019), 89--121.
[14]
Hichang Cho. 2023. Heterogeneous User Responses to Privacy Risks in Mobile Apps: Understanding the Dualistic Role of Privacy Risk Perceptions. In Proceedings of the 25th International Conference on Mobile Human-Computer Interaction. 1--7.
[15]
Hanbyul Choi, Jonghwa Park, and Yoonhyuk Jung. 2018. The role of privacy fatigue in online privacy behavior. Computers in Human Behavior, Vol. 81 (2018), 42--51.
[16]
Tae Rang Choi and Yongjun Sung. 2018. Instagram versus Snapchat: Self-expression and privacy concern on social media. Telematics and informatics, Vol. 35, 8 (2018), 2289--2298.
[17]
Emily Christofides, Amy Muise, and Serge Desmarais. 2009. Information disclosure and control on Facebook: are they two sides of the same coin or two different processes? Cyberpsychology & behavior, Vol. 12, 3 (2009), 341--345.
[18]
Victoria Clarke and Virginia Braun. 2017. Thematic analysis. The journal of positive psychology, Vol. 12, 3 (2017), 297--298.
[19]
Lorrie Faith Cranor. 2012. Necessary but not sufficient: Standardized mechanisms for privacy notice and choice. J. on Telecomm. & High Tech. L., Vol. 10 (2012), 273.
[20]
Robert E Crossler and France Bélanger. 2019. Why would I use location-protective settings on my smartphone? Motivating protective behaviors and the existence of the privacy knowledge--belief gap. Information Systems Research, Vol. 30, 3 (2019), 995--1006.
[21]
Ricardo de Sena Abrah ao, Stella Naomi Moriguchi, and Darly Fernando Andrade. 2016. Intention of adoption of mobile payment: An analysis in the light of the Unified Theory of Acceptance and Use of Technology (UTAUT). RAI Revista de administracao e Inovacao, Vol. 13, 3 (2016), 221--230.
[22]
George Denison. 2023. How much should you pay research participants? Prolific. https://www.prolific.co/blog/how-much-should-you-pay-research-participants Retrieved May 14, 2023 from
[23]
Sami Fathi. 2021. More Users Trust Amazon and Google to Handle Their Personal User Data Than Apple, Survey Suggests. https://www.macrumors.com/2021/12/22/survey-amazon-and-google-user-data-more-than-apple/
[24]
Michelle Faverio. [n.,d.]. Key findings about Americans and data privacy. https://www.pewresearch.org/short-reads/2023/10/18/key-findings-about-americans-and-data-privacy/
[25]
Kassem Fawaz, Huan Feng, and Kang G Shin. 2015. Anatomization and protection of mobile $$Apps?$$ location privacy threats. In 24th USENIX Security Symposium (USENIX Security 15). 753--768.
[26]
Drew Fisher, Leah Dorner, and David Wagner. 2012. Short paper: location privacy: user behavior in the field. In Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices. 51--56.
[27]
Gerald Friedland, Robin Sommer, et al. 2010. Cybercasing the Joint: On the Privacy Implications of $$Geo-Tagging$$. In 5th USENIX workshop on Hot Topics in Security (HotSec 10).
[28]
Marco Furini and Valentina Tamanini. 2015. Location privacy and public metadata in social media platforms: attitudes, behaviors and opinions. Multimedia Tools and Applications, Vol. 74 (2015), 9795--9825.
[29]
Jie Gu, Jing Tian, and Yunjie Calvin Xu. 2022. Private or not? The categorical differences in mobile users? privacy decision-making. Electronic Commerce Research and Applications, Vol. 52 (2022), 101122.
[30]
Eszter Hargittai and Alice Marwick. 2016. 'What can I really do'? Explaining the privacy paradox with online apathy. International journal of communication, Vol. 10 (2016), 21.
[31]
Mariea Grubbs Hoy and George Milne. 2010. Gender differences in privacy-related measures for young adult Facebook users. Journal of interactive advertising, Vol. 10, 2 (2010), 28--45.
[32]
Julie Jiang, Jesse Thomason, Francesco Barbieri, and Emilio Ferrara. 2023. Geolocated Social Media Posts are Happier: Understanding the Characteristics of Check-in Posts on Twitter. In Proceedings of the 15th ACM Web Science Conference 2023. 136--146.
[33]
Farzaneh Karegar, Nina Gerber, Melanie Volkamer, and Simone Fischer-Hübner. 2018. Helping john to make informed decisions on using social login. In Proceedings of the 33rd Annual ACM Symposium on Applied Computing. 1165--1174.
[34]
Farzaneh Karegar, Daniel Lindegren, John Sören Pettersson, and Simone Fischer-Hübner. 2018. User evaluations of an app interface for cloud-based identity management. In Advances in Information Systems Development: Methods, Tools and Management. Springer, 205--223.
[35]
Patrick Gage Kelley, Lucian Cesca, Joanna Bresee, and Lorrie Faith Cranor. 2010. Standardizing privacy notices: an online study of the nutrition label approach. In Proceedings of the SIGCHI Conference on Human factors in Computing Systems. 1573--1582.
[36]
Dhananjay Khatri. 2023. Study reveals 38 out of 50 most popular mobile games are data-hungry apps. https://www.cnbctv18.com/technology/study-reveals-38-out-of-50-most-popular-mobile-games-are-data-hungry-apps-16811261.htm
[37]
Boonchai Kijsanayotin, Supasit Pannarunothai, and Stuart M Speedie. 2009. Factors influencing health information technology adoption in Thailand's community health centers: Applying the UTAUT model. International journal of medical informatics, Vol. 78, 6 (2009), 404--416.
[38]
Hyang-Sook Kim. 2016. What drives you to check in on Facebook? Motivations, privacy concerns, and mobile phone involvement for location-based information sharing. Computers in Human Behavior, Vol. 54 (2016), 397--406.
[39]
Sung S Kim and James Agarwal. 2004. Internet Users? Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Casual Model. Information Systems Research, Vol. 15, 4 (2004), 336--355.
[40]
Konrad Kollnig, Anastasia Shuba, Reuben Binns, Max Van Kleek, and Nigel Shadbolt. 2021. Are iphones really better for privacy? comparative study of ios and android apps. arXiv preprint arXiv:2109.13722 (2021).
[41]
Vassilis Kostakos, Denzil Ferreira, Jorge Goncalves, and Simo Hosio. 2016. Modelling smartphone usage: a markov state transition model. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (Heidelberg, Germany) (UbiComp '16). Association for Computing Machinery, New York, NY, USA, 486--497.
[42]
Zoltán Kovács, György Vida, Ábel Elekes, and Tamás Kovalcsik. 2021. Combining social media and mobile positioning data in the analysis of tourist flows: A case study from Szeged, Hungary. Sustainability, Vol. 13, 5 (2021), 2926.
[43]
Oksana Kulyk, Paul Gerber, Michael El Hanafi, Benjamin Reinheimer, Karen Renaud, and Melanie Volkamer. 2016. Encouraging privacy-aware smartphone app installation: Finding out what the technically-adept do. (2016).
[44]
Ponnurangam Kumaraguru and Lorrie Faith Cranor. 2005. Privacy indexes: a survey of Westin's studies. (2005).
[45]
Yoonjoo Lee, John Joon Young Chung, Jean Y Song, Minsuk Chang, and Juho Kim. 2021. Personalizing ambience and illusionary presence: How people use 'study with me' videos to create effective studying environments. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1--13.
[46]
Huaxin Li, Haojin Zhu, Suguo Du, Xiaohui Liang, and Xuemin Shen. 2016. Privacy leakage of location sharing in mobile social networks: Attacks and defense. IEEE Transactions on Dependable and Secure Computing, Vol. 15, 4 (2016), 646--660.
[47]
Chung-Feng Liu, Yung-Chieh Tsai, and Fong-Lin Jang. 2013. Patients? acceptance towards a web-based personal health record system: an empirical study in Taiwan. International journal of environmental research and public health, Vol. 10, 10 (2013), 5191--5208.
[48]
Ivy LB Liu, Christy MK Cheung, and Matthew KO Lee. 2010. Understanding Twitter usage: What drive people continue to tweet. (2010).
[49]
Ying Ma, Qiushi Zhou, Benjamin Tag, Zhanna Sarsenbayeva, Jarrod Knibbe, and Jorge Goncalves. 2023. 'Hello, Fellow Villager!': Perceptions and Impact of Displaying Users? Locations on Weibo. In IFIP Conference on Human-Computer Interaction. Springer, 511--532.
[50]
Jalal Mahmud, Jeffrey Nichols, and Clemens Drews. 2014. Home location identification of twitter users. arXiv preprint arXiv:1403.2345 (2014).
[51]
Karola Marky, Verena Zimmermann, Alina Stöver, Philipp Hoffmann, Kai Kunze, and Max Mühlhäuser. 2020. All in one! user perceptions on centralized iot privacy settings. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1--8.
[52]
Philipp K Masur, Doris Teutsch, and Sabine Trepte. 2017. Development and Validation of the Online Privacy Literacy Scale (OPLIS). Diagnostica, Vol. 63, 4 (2017), 256--268.
[53]
Trevor T Moores. 2012. Towards an integrated model of IT acceptance in healthcare. Decision Support Systems, Vol. 53, 3 (2012), 507--516.
[54]
Bahri-Ammari Nedra, Walid Hadhri, and Mariem Mezrani. 2019. Determinants of customers' intentions to use hedonic networks: The case of Instagram. Journal of Retailing and Consumer Services, Vol. 46 (2019), 21--32.
[55]
Jonathan A Obar and Anne Oeldorf-Hirsch. 2020. The biggest lie on the internet: Ignoring the privacy policies and terms of service policies of social networking services. Information, Communication & Society, Vol. 23, 1 (2020), 128--147.
[56]
Sameer Patil, Greg Norcie, Apu Kapadia, and Adam J Lee. 2012. Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice. In proceedings of the Eighth Symposium on Usable Privacy and Security. 1--15.
[57]
Amira Farah Abdul Rashid and Zarul Fitri Zaaba. 2020. Facebook, Twitter, and Instagram: The Privacy Challenges. In 2020 International Conference on Promising Electronic Technologies (ICPET). IEEE, 122--127.
[58]
Bernardo Reynolds, Jayant Venkatanathan, Jorge Gonccalves, and Vassilis Kostakos. 2011. Sharing Ephemeral Information in Online Social Networks: Privacy Perceptions and Behaviours. In Human-Computer Interaction -- INTERACT 2011, Pedro Campos, Nicholas Graham, Joaquim Jorge, Nuno Nunes, Philippe Palanque, and Marco Winckler (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 204--215.
[59]
Siwi Sarita and Julia Suleeman. 2017. The relationship between the need to belong and Instagram self-presentation among adolescents. In Universitas Indonesia Psychology Symposium for Undergraduate Research.
[60]
Florian Schaub, Rebecca Balebako, and Lorrie Faith Cranor. 2017. Designing effective privacy notices and controls. IEEE Internet Computing, Vol. 21, 3 (2017), 70--77.
[61]
Wilmar B Schaufeli. 1996. Maslach burnout inventory-general survey (MBI-GS). Maslach burnout inventory manual (1996).
[62]
Elisa Serafinelli and Andrew Cox. 2019. 'Privacy does not interest me'. A comparative analysis of photo sharing on Instagram and Blipfoto. Visual Studies, Vol. 34, 1 (2019), 67--78.
[63]
Christina Shane-Simpson, Adriana Manago, Naomi Gaggi, and Kristen Gillespie-Lynch. 2018. Why do college students prefer Facebook, Twitter, or Instagram? Site affordances, tensions between privacy and self-expression, and implications for social capital. Computers in human behavior, Vol. 86 (2018), 276--288.
[64]
statista. 2019. Number of apps installed by mobile users in the United States as of 3rd quarter 2019. https://www.statista.com/statistics/267309/number-of-apps-on-mobile-phones/
[65]
Gareth Terry, Nikki Hayfield, Victoria Clarke, and Virginia Braun. 2017. Thematic analysis. The SAGE handbook of qualitative research in psychology, Vol. 2 (2017), 17--37.
[66]
Zeynep Tufekci. 2008. Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science, Technology & Society, Vol. 28, 1 (2008), 20--36.
[67]
Jayant Venkatanathan, Vassilis Kostakos, Evangelos Karapanos, and Jorge Gonçalves. 2013. Online Disclosure of Personally Identifiable Information with Strangers: Effects of Public and Private Sharing. Interacting with Computers, Vol. 26, 6 (11 2013), 614--626. https://doi.org/10.1093/iwc/iwt058
[68]
Viswanath Venkatesh, Michael G Morris, Gordon B Davis, and Fred D Davis. 2003. User acceptance of information technology: Toward a unified view. MIS quarterly (2003), 425--478.
[69]
Na Wang, Bo Zhang, Bin Liu, and Hongxia Jin. 2015. Investigating effects of control and ads awareness on android users' privacy behaviors and perceptions. In Proceedings of the 17th international conference on human-computer interaction with mobile devices and services. 373--382.
[70]
Paweł W Wo'zniak, Thomas Kosch, Eleonora Mencarini, Andrzej Romanowski, and Jasmin Niess. 2021. ?I would have Preferred an Ankle Tag?: The Lived Experience of a Nationwide Quarantine App. In Proceedings of the 23rd International Conference on Mobile Human-Computer Interaction. 1--13.
[71]
Yue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, and Luyi Xing. 2023. Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 1091--1108. https://www.usenix.org/conference/usenixsecurity23/presentation/xiao-yue
[72]
Mike Z Yao. 2011. Self-protection of online privacy: A behavioral approach. In Privacy online: Perspectives on privacy and self-disclosure in the social web. Springer, 111--125.
[73]
Alyson Leigh Young and Anabel Quan-Haase. 2013. Privacy protection strategies on Facebook: The Internet privacy paradox revisited. Information, Communication & Society, Vol. 16, 4 (2013), 479--500.
[74]
Aristea M Zafeiropoulou, David E Millard, Craig Webber, and Kieron O'Hara. 2013. Unpicking the privacy paradox: can structuration theory help to explain location-based privacy decisions?. In Proceedings of the 5th Annual ACM Web Science Conference. 463--472.
[75]
Xin Zheng, Jialong Han, and Aixin Sun. 2018. A survey of location prediction on twitter. IEEE Transactions on Knowledge and Data Engineering, Vol. 30, 9 (2018), 1652--1671.

Index Terms

  1. Understanding Users' Perspectives on Location Privacy Management on iPhones

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Proceedings of the ACM on Human-Computer Interaction
    Proceedings of the ACM on Human-Computer Interaction  Volume 8, Issue MHCI
    MHCI
    September 2024
    1136 pages
    EISSN:2573-0142
    DOI:10.1145/3697825
    Issue’s Table of Contents
    This work is licensed under a Creative Commons Attribution-NonCommercial International 4.0 License.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 September 2024
    Published in PACMHCI Volume 8, Issue MHCI

    Check for updates

    Author Tags

    1. instagram
    2. iphones
    3. location privacy
    4. privacy management
    5. privacy paradox
    6. smartphones
    7. twitter
    8. yelp

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 245
      Total Downloads
    • Downloads (Last 12 months)245
    • Downloads (Last 6 weeks)60
    Reflects downloads up to 27 Feb 2025

    Other Metrics

    Citations

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Full Access

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media