Usable Privacy for Mobile Sensing Applications View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2014

AUTHORS

Delphine Christin , Franziska Engelmann , Matthias Hollick

ABSTRACT

Current mobile applications gather an increasing amount of data about the users and their environment. To protect their privacy, users can currently either opt out of using the applications or switch off their mobile phones. Such binary choices, however, void potential benefit for both users and applications. As an alternative, finer control over their privacy could be given to users by deploying privacy-preserving mechanisms. However, it is unclear if users are able to perform the necessary configuration of such schemes. In this paper, we therefore investigate to which degree users can understand the underlying mechanisms as well as the resulting trade-offs in terms of, e.g., privacy protection and battery consumption. To this end, we have conducted a user study involving 20 participants based on user interfaces especially designed for this purpose. The results show that our participants would prefer deciding on the consequences and leave the system parameterizing the underlying mechanism. More... »

PAGES

92-107

Book

TITLE

Information Security Theory and Practice. Securing the Internet of Things

ISBN

978-3-662-43825-1
978-3-662-43826-8

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-662-43826-8_7

DOI

http://dx.doi.org/10.1007/978-3-662-43826-8_7

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1022160104


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Fraunhofer FKIE, Fraunhoferstr. 20, 53343, Wachtberg, Germany", 
          "id": "http://www.grid.ac/institutes/grid.469836.6", 
          "name": [
            "University of Bonn, Friedrich-Ebert-Allee 144, 53113, Bonn, Germany", 
            "Fraunhofer FKIE, Fraunhoferstr. 20, 53343, Wachtberg, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Christin", 
        "givenName": "Delphine", 
        "id": "sg:person.016422332615.77", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016422332615.77"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Technische Universit\u00e4t Darmstadt, Mornewegstr. 32, 64293, Darmstadt, Germany", 
          "id": "http://www.grid.ac/institutes/grid.6546.1", 
          "name": [
            "Technische Universit\u00e4t Darmstadt, Mornewegstr. 32, 64293, Darmstadt, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Engelmann", 
        "givenName": "Franziska", 
        "id": "sg:person.014452113577.89", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014452113577.89"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Technische Universit\u00e4t Darmstadt, Mornewegstr. 32, 64293, Darmstadt, Germany", 
          "id": "http://www.grid.ac/institutes/grid.6546.1", 
          "name": [
            "Technische Universit\u00e4t Darmstadt, Mornewegstr. 32, 64293, Darmstadt, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Hollick", 
        "givenName": "Matthias", 
        "id": "sg:person.010143067443.79", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010143067443.79"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2014", 
    "datePublishedReg": "2014-01-01", 
    "description": "Current mobile applications gather an increasing amount of data about the users and their environment. To protect their privacy, users can currently either opt out of using the applications or switch off their mobile phones. Such binary choices, however, void potential benefit for both users and applications. As an alternative, finer control over their privacy could be given to users by deploying privacy-preserving mechanisms. However, it is unclear if users are able to perform the necessary configuration of such schemes. In this paper, we therefore investigate to which degree users can understand the underlying mechanisms as well as the resulting trade-offs in terms of, e.g., privacy protection and battery consumption. To this end, we have conducted a user study involving 20 participants based on user interfaces especially designed for this purpose. The results show that our participants would prefer deciding on the consequences and leave the system parameterizing the underlying mechanism.", 
    "editor": [
      {
        "familyName": "Naccache", 
        "givenName": "David", 
        "type": "Person"
      }, 
      {
        "familyName": "Sauveron", 
        "givenName": "Damien", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-662-43826-8_7", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-662-43825-1", 
        "978-3-662-43826-8"
      ], 
      "name": "Information Security Theory and Practice. Securing the Internet of Things", 
      "type": "Book"
    }, 
    "keywords": [
      "privacy-preserving mechanisms", 
      "mobile sensing applications", 
      "current mobile applications", 
      "amount of data", 
      "usable privacy", 
      "privacy protection", 
      "user interface", 
      "user study", 
      "mobile applications", 
      "battery consumption", 
      "privacy", 
      "users", 
      "mobile phones", 
      "necessary configuration", 
      "such schemes", 
      "sensing applications", 
      "applications", 
      "phones", 
      "scheme", 
      "environment", 
      "interface", 
      "potential benefits", 
      "system", 
      "fine control", 
      "consumption", 
      "data", 
      "configuration", 
      "benefits", 
      "terms", 
      "results", 
      "end", 
      "purpose", 
      "alternative", 
      "amount", 
      "control", 
      "protection", 
      "mechanism", 
      "choice", 
      "binary choice", 
      "participants", 
      "consequences", 
      "study", 
      "underlying mechanism", 
      "paper", 
      "Such binary choices", 
      "void potential benefit", 
      "degree users"
    ], 
    "name": "Usable Privacy for Mobile Sensing Applications", 
    "pagination": "92-107", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1022160104"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-662-43826-8_7"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-662-43826-8_7", 
      "https://app.dimensions.ai/details/publication/pub.1022160104"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2021-12-01T20:00", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20211201/entities/gbq_results/chapter/chapter_224.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-662-43826-8_7"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-43826-8_7'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-43826-8_7'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-43826-8_7'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-43826-8_7'


 

This table displays all metadata directly associated to this object as RDF triples.

130 TRIPLES      23 PREDICATES      73 URIs      66 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-662-43826-8_7 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N7f8f845f8bde40088cf3b76f0b913ed4
4 schema:datePublished 2014
5 schema:datePublishedReg 2014-01-01
6 schema:description Current mobile applications gather an increasing amount of data about the users and their environment. To protect their privacy, users can currently either opt out of using the applications or switch off their mobile phones. Such binary choices, however, void potential benefit for both users and applications. As an alternative, finer control over their privacy could be given to users by deploying privacy-preserving mechanisms. However, it is unclear if users are able to perform the necessary configuration of such schemes. In this paper, we therefore investigate to which degree users can understand the underlying mechanisms as well as the resulting trade-offs in terms of, e.g., privacy protection and battery consumption. To this end, we have conducted a user study involving 20 participants based on user interfaces especially designed for this purpose. The results show that our participants would prefer deciding on the consequences and leave the system parameterizing the underlying mechanism.
7 schema:editor N05821838e85b4cb0a5fedc49b085e34f
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf Nb230824a31d44ed0b7b8c10b1b9ff563
12 schema:keywords Such binary choices
13 alternative
14 amount
15 amount of data
16 applications
17 battery consumption
18 benefits
19 binary choice
20 choice
21 configuration
22 consequences
23 consumption
24 control
25 current mobile applications
26 data
27 degree users
28 end
29 environment
30 fine control
31 interface
32 mechanism
33 mobile applications
34 mobile phones
35 mobile sensing applications
36 necessary configuration
37 paper
38 participants
39 phones
40 potential benefits
41 privacy
42 privacy protection
43 privacy-preserving mechanisms
44 protection
45 purpose
46 results
47 scheme
48 sensing applications
49 study
50 such schemes
51 system
52 terms
53 underlying mechanism
54 usable privacy
55 user interface
56 user study
57 users
58 void potential benefit
59 schema:name Usable Privacy for Mobile Sensing Applications
60 schema:pagination 92-107
61 schema:productId N6e1f6b18678f4fed910092a5ec1659fe
62 Nd02e19e979274fb2811440efe4358c73
63 schema:publisher N9a53d97e78f64180ad210750dcaaf8e0
64 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022160104
65 https://doi.org/10.1007/978-3-662-43826-8_7
66 schema:sdDatePublished 2021-12-01T20:00
67 schema:sdLicense https://scigraph.springernature.com/explorer/license/
68 schema:sdPublisher N4d911d35dedf4eb892f2b14aa070ef5c
69 schema:url https://doi.org/10.1007/978-3-662-43826-8_7
70 sgo:license sg:explorer/license/
71 sgo:sdDataset chapters
72 rdf:type schema:Chapter
73 N05821838e85b4cb0a5fedc49b085e34f rdf:first Na9f91188123548a3af793049699723cd
74 rdf:rest Nf040ad252f4c428598a4a731c95c3e01
75 N30eccde8ca2642c4b45c8f042f14f681 rdf:first sg:person.010143067443.79
76 rdf:rest rdf:nil
77 N4d911d35dedf4eb892f2b14aa070ef5c schema:name Springer Nature - SN SciGraph project
78 rdf:type schema:Organization
79 N6e1f6b18678f4fed910092a5ec1659fe schema:name dimensions_id
80 schema:value pub.1022160104
81 rdf:type schema:PropertyValue
82 N7f8f845f8bde40088cf3b76f0b913ed4 rdf:first sg:person.016422332615.77
83 rdf:rest Necc1ba7c24e94b2ebcf3b17aa4dc90d8
84 N9a53d97e78f64180ad210750dcaaf8e0 schema:name Springer Nature
85 rdf:type schema:Organisation
86 Na77a9b5608cc4e42b40e3427d17cfb18 schema:familyName Sauveron
87 schema:givenName Damien
88 rdf:type schema:Person
89 Na9f91188123548a3af793049699723cd schema:familyName Naccache
90 schema:givenName David
91 rdf:type schema:Person
92 Nb230824a31d44ed0b7b8c10b1b9ff563 schema:isbn 978-3-662-43825-1
93 978-3-662-43826-8
94 schema:name Information Security Theory and Practice. Securing the Internet of Things
95 rdf:type schema:Book
96 Nd02e19e979274fb2811440efe4358c73 schema:name doi
97 schema:value 10.1007/978-3-662-43826-8_7
98 rdf:type schema:PropertyValue
99 Necc1ba7c24e94b2ebcf3b17aa4dc90d8 rdf:first sg:person.014452113577.89
100 rdf:rest N30eccde8ca2642c4b45c8f042f14f681
101 Nf040ad252f4c428598a4a731c95c3e01 rdf:first Na77a9b5608cc4e42b40e3427d17cfb18
102 rdf:rest rdf:nil
103 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
104 schema:name Information and Computing Sciences
105 rdf:type schema:DefinedTerm
106 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
107 schema:name Data Format
108 rdf:type schema:DefinedTerm
109 sg:person.010143067443.79 schema:affiliation grid-institutes:grid.6546.1
110 schema:familyName Hollick
111 schema:givenName Matthias
112 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010143067443.79
113 rdf:type schema:Person
114 sg:person.014452113577.89 schema:affiliation grid-institutes:grid.6546.1
115 schema:familyName Engelmann
116 schema:givenName Franziska
117 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014452113577.89
118 rdf:type schema:Person
119 sg:person.016422332615.77 schema:affiliation grid-institutes:grid.469836.6
120 schema:familyName Christin
121 schema:givenName Delphine
122 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016422332615.77
123 rdf:type schema:Person
124 grid-institutes:grid.469836.6 schema:alternateName Fraunhofer FKIE, Fraunhoferstr. 20, 53343, Wachtberg, Germany
125 schema:name Fraunhofer FKIE, Fraunhoferstr. 20, 53343, Wachtberg, Germany
126 University of Bonn, Friedrich-Ebert-Allee 144, 53113, Bonn, Germany
127 rdf:type schema:Organization
128 grid-institutes:grid.6546.1 schema:alternateName Technische Universität Darmstadt, Mornewegstr. 32, 64293, Darmstadt, Germany
129 schema:name Technische Universität Darmstadt, Mornewegstr. 32, 64293, Darmstadt, Germany
130 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...