Crowdsourcing for Context: Regarding Privacy in Beacon Encounters via Contextual Integrity

Open access

Abstract

Research shows that context is important to the privacy perceptions associated with technology. With Bluetooth Low Energy beacons, one of the latest technologies for providing proximity and indoor tracking, the current identifiers that characterize a beacon are not sufficient for ordinary users to make informed privacy decisions about the location information that could be shared. One solution would be to have standardized category and privacy labels, produced by beacon providers or an independent third-party. An alternative solution is to find an approach driven by users, for users. In this paper, we propose a novel crowdsourcing based approach to introduce elements of context in beacon encounters.We demonstrate the effectiveness of this approach through a user study, where participants use a crowd-based mobile app designed to collect beacon category and privacy information as a scavenger hunt game. Results show that our approach was effective in helping users label beacons according to the specific context of a given beacon encounter, as well as the privacy perceptions associated with it. This labeling was done with an accuracy of 92%, and with an acceptance rate of 82% of all recommended crowd labels. Lastly, we conclusively show how crowdsourcing for context can be used towards a user-centric framework for privacy management during beacon encounters.

If the inline PDF is not rendering correctly, you can download the PDF file here.

  • [1] Helen Nissenbaum. Privacy as contextual integrity. Washington law review 79(1) 2004.

  • [2] Galen Grumen. What you need to know about using bluetooth beacons 2014. http://www.infoworld.com/article/2608498/mobile-apps/what-you-need-to-know-about-usingbluetooth-beacons.html.

  • [3] Cathy Goodwin. A conceptualization of motives to seek privacy for nondeviant consumption. Journal of Consumer Psychology 1(3):261-284 1992.

  • [4] Bluetooth SIG. Bluetooth smart technology: Powering the internet of things 2015. http://www.bluetooth.com/Pages/Bluetooth-Smart.aspx.

  • [5] Bluetooth SIG. Welcome to bluetooth technology 101 2015. http://www.bluetooth.com/Pages/Fast-Facts.aspx.

  • [6] Bluetooth SIG. Are ibeacons cookies for the physical web? 2015. http://www.bluetooth.com/Pages/Consumer-Electronics-Market.aspx.

  • [7] Jeff Howe. The rise of crowdsourcing. Wired magazine 14(6):1-4 2006.

  • [8] Jakob Voss. Measuring wikipedia. 2005.

  • [9] Michael Buhrmester Tracy Kwang and Samuel D Gosling. Amazon’s mechanical turk a new source of inexpensive yet high-quality data? Perspectives on psychological science 6(1):3-5 2011.

  • [10] David P Anderson Jeff Cobb Eric Korpela Matt Lebofsky and Dan Werthimer. Seti@ home: an experiment in public-resource computing. Communications of the ACM 45(11):56-61 2002.

  • [11] Daren C Brabham. Moving the crowd at threadless: Motivations for participation in a crowdsourcing application. Information Communication & Society 13(8):1122-1145 2010.

  • [12] Thomas W Malone Robert Laubacher and Chrysanthos Dellarocas. The collective intelligence genome. IEEE Engineering Management Review 38(3):38 2010.

  • [13] Jialiu Lin Bin Liu Norman Sadeh and Jason I Hong. Modeling users’ mobile app privacy preferences: Restoring usability in a sea of permission settings. In Symposium on Usable Privacy and Security (SOUPS) 2014.

  • [14] Bin Liu Jialiu Lin and Norman Sadeh. Reconciling mobile app privacy and usability on smartphones: could user privacy profiles help? In Proceedings of the 23rd international conference on World wide web pages 201-212. ACM 2014.

  • [15] Jialiu Lin Guang Xiang Jason I. Hong and Norman Sadeh. Modeling people’s place naming preferences in location sharing. In Proceedings of the 12th ACM International Conference on Ubiquitous Computing UbiComp ’10 pages 75-84 New York NY USA 2010. ACM.

  • [16] Norman Sadeh Alessandro Acquisti Travis D Breaux Lorrie Faith Cranor Aleecia M McDonalda Joel R Reidenbergb Noah A Smith Fei Liu N Cameron Russellb Florian Schaub et al. The usable privacy policy project. Technical report Tech. report CMU-ISR-13-119 Carnegie Mellon University 2013.

  • [17] Iker Burguera Urko Zurutuza and Simin Nadjm-Tehrani. Crowdroid: behavior-based malware detection system for android. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices pages 15-26. ACM 2011.

  • [18] Jialiu Lin Shahriyar Amini Jason I Hong Norman Sadeh Janne Lindqvist and Joy Zhang. Expectation and purpose: understanding users’ mental models of mobile app privacy through crowdsourcing. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing pages 501-510. ACM 2012.

  • [19] Yuvraj Agarwal and Malcolm Hall. Protectmyprivacy: detecting and mitigating privacy leaks on ios devices using crowdsourcing. In Proceeding of the 11th annual international conference on Mobile systems applications and services pages 97-110. ACM 2013.

  • [20] Estimote. Estimote beacons 2015. http://estimote.com/.

  • [21] Luis Von Ahn. Games with a purpose. Computer 39(6):92-94 2006.

Search
Journal information
Cited By
Metrics
All Time Past Year Past 30 Days
Abstract Views 0 0 0
Full Text Views 225 118 6
PDF Downloads 102 52 3