Crowdsourcing for Context: Regarding Privacy in Beacon Encounters via Contextual Integrity

Open access

Abstract

Research shows that context is important to the privacy perceptions associated with technology. With Bluetooth Low Energy beacons, one of the latest technologies for providing proximity and indoor tracking, the current identifiers that characterize a beacon are not sufficient for ordinary users to make informed privacy decisions about the location information that could be shared. One solution would be to have standardized category and privacy labels, produced by beacon providers or an independent third-party. An alternative solution is to find an approach driven by users, for users. In this paper, we propose a novel crowdsourcing based approach to introduce elements of context in beacon encounters.We demonstrate the effectiveness of this approach through a user study, where participants use a crowd-based mobile app designed to collect beacon category and privacy information as a scavenger hunt game. Results show that our approach was effective in helping users label beacons according to the specific context of a given beacon encounter, as well as the privacy perceptions associated with it. This labeling was done with an accuracy of 92%, and with an acceptance rate of 82% of all recommended crowd labels. Lastly, we conclusively show how crowdsourcing for context can be used towards a user-centric framework for privacy management during beacon encounters.

[1] Helen Nissenbaum. Privacy as contextual integrity. Washington law review, 79(1), 2004.

[2] Galen Grumen. What you need to know about using bluetooth beacons, 2014. http://www.infoworld.com/article/2608498/mobile-apps/what-you-need-to-know-about-usingbluetooth-beacons.html.

[3] Cathy Goodwin. A conceptualization of motives to seek privacy for nondeviant consumption. Journal of Consumer Psychology, 1(3):261-284, 1992.

[4] Bluetooth SIG. Bluetooth smart technology: Powering the internet of things, 2015. http://www.bluetooth.com/Pages/Bluetooth-Smart.aspx.

[5] Bluetooth SIG. Welcome to bluetooth technology 101, 2015. http://www.bluetooth.com/Pages/Fast-Facts.aspx.

[6] Bluetooth SIG. Are ibeacons cookies for the physical web?, 2015. http://www.bluetooth.com/Pages/Consumer-Electronics-Market.aspx.

[7] Jeff Howe. The rise of crowdsourcing. Wired magazine, 14(6):1-4, 2006.

[8] Jakob Voss. Measuring wikipedia. 2005.

[9] Michael Buhrmester, Tracy Kwang, and Samuel D Gosling. Amazon’s mechanical turk a new source of inexpensive, yet high-quality, data? Perspectives on psychological science, 6(1):3-5, 2011.

[10] David P Anderson, Jeff Cobb, Eric Korpela, Matt Lebofsky, and Dan Werthimer. Seti@ home: an experiment in public-resource computing. Communications of the ACM, 45(11):56-61, 2002.

[11] Daren C Brabham. Moving the crowd at threadless: Motivations for participation in a crowdsourcing application. Information, Communication & Society, 13(8):1122-1145, 2010.

[12] Thomas W Malone, Robert Laubacher, and Chrysanthos Dellarocas. The collective intelligence genome. IEEE Engineering Management Review, 38(3):38, 2010.

[13] Jialiu Lin Bin Liu Norman Sadeh and Jason I Hong. Modeling users’ mobile app privacy preferences: Restoring usability in a sea of permission settings. In Symposium on Usable Privacy and Security (SOUPS), 2014.

[14] Bin Liu, Jialiu Lin, and Norman Sadeh. Reconciling mobile app privacy and usability on smartphones: could user privacy profiles help? In Proceedings of the 23rd international conference on World wide web, pages 201-212. ACM, 2014.

[15] Jialiu Lin, Guang Xiang, Jason I. Hong, and Norman Sadeh. Modeling people’s place naming preferences in location sharing. In Proceedings of the 12th ACM International Conference on Ubiquitous Computing, UbiComp ’10, pages 75-84, New York, NY, USA, 2010. ACM.

[16] Norman Sadeh, Alessandro Acquisti, Travis D Breaux, Lorrie Faith Cranor, Aleecia M McDonalda, Joel R Reidenbergb, Noah A Smith, Fei Liu, N Cameron Russellb, Florian Schaub, et al. The usable privacy policy project. Technical report, Tech. report CMU-ISR-13-119, Carnegie Mellon University, 2013.

[17] Iker Burguera, Urko Zurutuza, and Simin Nadjm-Tehrani. Crowdroid: behavior-based malware detection system for android. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, pages 15-26. ACM, 2011.

[18] Jialiu Lin, Shahriyar Amini, Jason I Hong, Norman Sadeh, Janne Lindqvist, and Joy Zhang. Expectation and purpose: understanding users’ mental models of mobile app privacy through crowdsourcing. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing, pages 501-510. ACM, 2012.

[19] Yuvraj Agarwal and Malcolm Hall. Protectmyprivacy: detecting and mitigating privacy leaks on ios devices using crowdsourcing. In Proceeding of the 11th annual international conference on Mobile systems, applications, and services, pages 97-110. ACM, 2013.

[20] Estimote. Estimote beacons, 2015. http://estimote.com/.

[21] Luis Von Ahn. Games with a purpose. Computer, 39(6):92-94, 2006.

Journal Information

Cited By

Metrics

All Time Past Year Past 30 Days
Abstract Views 0 0 0
Full Text Views 118 118 12
PDF Downloads 56 56 6