690 likes | 764 Views
Choice Architectures for Mobile Privacy and Security: A Research Agenda. Serge Egelman UC Berkeley. Adverse selection. Example: SMS 73% of malware uses SMS capability 3 % of legitimate applications use it SMS capability signals potential malware Advice: “Don’t use apps that require SMS”
E N D
Choice Architectures for Mobile Privacy and Security:A Research Agenda Serge Egelman UC Berkeley
Adverse selection Example: SMS 73% of malware uses SMS capability 3% of legitimate applications use it SMS capability signals potential malware Advice: “Don’t use apps that require SMS” Is it possible to follow this advice?
Step 5: View permissions…still Services that cost you money Send SMS messages
Agenda Choice architecture Lessons from privacy research Previous findings Questions and considerations
Framing options to have an impact on outcome Choice architectures R. Thaler and C. Sunstein. Nudge: Improving decisions about health, wealth, and happiness. Yale University Press, New Haven and London, 2008.
Smartphones Current devices implement choice architectures for granting capabilities to applications:
Users aren’t being served Curating the market is expensive Does not scale Asking the first time may be insufficient Capability requests are needed Previous findings 82.5% do not notice permissions 97.4% misunderstood meanings Current architecture is unhelpful
Privacy preferences No literature [yet] on security preferences Wealth of literature on online privacy: When explicitly asked, users care what information they share and with whom1,2,3 [1] A. F. Westin. E-Commerce & Privacy: What Net Users Want. Privacy & American Business, Hackensack, NJ, 1998. http://www.pwcglobal.com/gx/eng/svcs/privacy/images/E-Commerce.pdf. [2] M. S. Ackerman, L. F. Cranor, and J. Reagle. Privacy in e-commerce: examining user scenarios and privacy preferences. In EC ’99: Proceedings of the 1st ACM Conference on Electronic Commerce, pages 1–8, New York, NY, USA, 1999. ACM. http://www.eecs.umich.edu/ackerm/pub/99b28/ecommerce.final.pdf. [3] d. boyd and E. Hargittai. Facebook privacy settings: Who cares? First Monday, 15(8), August 2010.
Privacy behaviors Privacy behaviors rarely match preferences: Users readily disclose information1 Decisions are often regretted2,3 [1] S. Spiekermann, J. Grossklags, and B. Berendt. E-Privacy in 2nd Generation E-Commerce: Privacy Preferences versus Actual Behavior. In Proceedings of EC’01: Third ACM Conference on Electronic Commerce, pages 38–47, Tampa, Florida, 2001. http://www.sims.berkeley.edu/~jensg/research/ eprivacy_acm.html. [2] N. Good, R. Dhamija, J. Grossklags, S. Aronovitz, D. Thaw, D. Mulligan, and J. Konstan. Stopping spyware at the gate: A user study of privacy, notice and spyware. In Proceedings of the Symposium On Usable Privacy and Security (SOUPS 2005), pages 43–52, Pittsburgh, PA, July 2005. [3] A. Acquisti. Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the ACM Electronic Commerce Conference (EC ’04), pages 21–29, New York, NY, 2004. ACM Press. http://www.heinz.cmu.edu/~acquisti/papers/privacy-gratification.pdf.
Why the discrepancy? Poorly designed choice architectures: Language is difficult1,2 Comprehension takes time3 Hyperbolic discounting4 [1] G. R. Milne and M. J. Culnan. Strategies for reducing online privacy risks: Why consumers read (or don’t read) online privacy notices. Journal of Interactive Marketing, 18(3):54–61, Summer 2004. [2] A. Anton, J. Earp, Q. He, W. Stufflebeam, D. Bolchini, and C. Jensen. Financial privacy policies and the need for standardization. IEEE Security & Privacy, 2(2):36–45, Mar-Apr 2004. [3] A. McDonald and L. Cranor. The cost of reading privacy policies. In Proceedings of the Technology Policy Research Conference, September 26–28 2008. [4] A. Acquisti and J. Grossklags. Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behavior. In Proceedings of The 2nd Annual Workshop on Economics and Information Security (WEIS ’03), 2003.
Privacy choice architectures Improved architecture led to better choices Privacy Finder Context matters1,2 Timing matters3 Lessons for smartphones? [1] J. Gideon, S. Egelman, L. Cranor, and A. Acquisti. Power Strips, Prophylactics, and Privacy, Oh My! In Proceedings of the 2006 Symposium on Usable Privacy and Security, pages 133–144, 2006. [2] J. Tsai, S. Egelman, L. Cranor, and A. Acquisti. The impact of privacy indicators on search engine browsing patterns. Information Systems Research, 22(2):254–268, June 2011. [3] S. Egelman, J. Tsai, L. F. Cranor, and A. Acquisti. Timing is everything?: the effects of timing and placement of online privacy indicators. In Proceedings of the 27th international conference on Human factors in computing systems, CHI ’09, pages 319–328, New York, NY, USA, 2009. ACM.
Notice 82.5% do not look at permissions 42% unaware permissions existed 42% aware but don’t use Explanations: Many were habituated—too many requests Many were unaware—too late in the process Suggestions: Only prompt when necessary Provide information earlier
Comprehension 97% could not define permissions 64% could not state SMS ability Explanations: All but one was confused with its category Not knowing full lists creates ambiguities Suggestions: Improve descriptions Narrow list of possible permissions
Card sorting exercise Merged redundancies Extraneous eliminated 170 Android 16 Windows Phone 50 Total permissions
Example:redundant permissions Read received SMS Power on/off Force stop applications View network state Read sent SMS Reboot Kill processes View WiFi state
Example:extraneous permissions Read sync stats Allow debugging Enable multicast Set orientation Vibrate Enable flashlight Do users really need to understand these? Are these really harmful?
Permission preferences survey Mechanical Turk survey measured: Level of concern for various permissions Whether users would pay for fewer permissions Demographics n=483, 52.6% Female 32.9% Android users US-based
Installation considerations Primary decision factors: 37% said cost 22% said description 17% said permissions Degree of consideration:1 Cost > permissions (p<0.0005) Description > permissions (p<0.0005) Ratings > permissions (p<0.0005) Permissions comparable with downloads 1. Wilcoxon signed ranks test