skip to main content
research-article

Anonymous or Not? Understanding the Factors Affecting Personal Mobile Data Disclosure

Authors Info & Claims
Published:23 March 2017Publication History
Skip Abstract Section

Abstract

The wide adoption of mobile devices and social media platforms have dramatically increased the collection and sharing of personal information. More and more frequently, users are called to make decisions concerning the disclosure of their personal information. In this study, we investigate the factors affecting users’ choices toward the disclosure of their personal data, including not only their demographic and self-reported individual characteristics, but also their social interactions and their mobility patterns inferred from months of mobile phone data activity. We report the findings of a field study conducted with a community of 63 subjects provided with (i) a smart-phone and (ii) a Personal Data Store (PDS) enabling them to control the disclosure of their data. We monitor the sharing behavior of our participants through the PDS and evaluate the contribution of different factors affecting their disclosing choices of location and social interaction data. Our analysis shows that social interaction inferred by mobile phones is an important factor revealing willingness to share, regardless of the data type. In addition, we provide further insights on the individual traits relevant to the prediction of sharing behavior.

References

  1. Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2015. Privacy and the human behavior in the age of information. Science 347, 6221 (2015), 509--514.Google ScholarGoogle Scholar
  2. Nadav Aharony, Wei Pan, Cory Ip, Inas Khayal, and Alex Pentland. 2011. Social fMRI: Investigating and shaping social mechanisms in the real world. Pervasive and Mobile Computing 7, 6 (2011), 643--659. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Yair Amichai-Hamburger and Gideon Vinitzky. 2010. Social network use and personality. Computers in Human Behavior 26, 6 (2010), 1289--1295. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Claudio Bettini and Daniele Riboni. 2015. Privacy protection in pervasive systems: State of the art and technical challenges. Pervasive and Mobile Computing 17 (2015), 159--174. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Laura Brandimarte, Alessandro Acquisti, and George Loewenstein. 2013. Misplaced confidences: Privacy and the control paradox. Social Psychological and Personality Science 4, 3 (2013), 340--347.Google ScholarGoogle ScholarCross RefCross Ref
  6. Luca Canzian and Mirco Musolesi. 2015. Trajectories of depression: Unobtrusive monitoring of depressive states by means of smartphone mobility traces analysis. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp’15). ACM, 1293--1304. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Simone Centellegher, Marco De Nadai, Michele Caraviello, Chiara Leonardi, Michele Vescovi, Yusi Ramadian, Nuria Oliver, Fabio Pianesi, Alex Pentland, Fabrizio Antonelli, and others. 2016. The mobile territorial lab: A multilayered and dynamic view on parents’ daily lives. EPJ Data Science 5, 1 (2016), 1.Google ScholarGoogle ScholarCross RefCross Ref
  8. Emily Christofides, Amy Muise, and Serge Desmarais. 2012. Hey mom, what’s on your Facebook? Comparing Facebook disclosure and privacy in adolescents and adults. Social Psychological and Personality Science 3, 1 (2012), 48--54.Google ScholarGoogle ScholarCross RefCross Ref
  9. Sunny Consolvo, Ian E. Smith, Tara Matthews, Anthony LaMarca, Jason Tabert, and Pauline Powledge. 2005. Location disclosure to social relations: Why, when, & what people want to share. In Proceedings of the 2005 Conference on Human Factors in Computing Systems, (CHI’05). ACM, 81--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Paul T. Costa and Robert R. McCrae. 2008. The revised neo personality inventory (neo-pi-r). The SAGE Handbook of Personality Theory and Assessment 2 (2008), 179--198.Google ScholarGoogle Scholar
  11. European Union Parliament 8 Council. 2016. Regulation (EU) 2016/679. (April 2016). Retrieved October 28, 2016 from http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32016R0679.Google ScholarGoogle Scholar
  12. Paul C. Cozby. 1973. Self-disclosure: A literature review. Psychological Bulletin 79, 2 (1973), 73.Google ScholarGoogle ScholarCross RefCross Ref
  13. Yves-Alexandre de Montjoye, César A Hidalgo, Michel Verleysen, and Vincent D. Blondel. 2013. Unique in the crowd: The privacy bounds of human mobility. Scientific Reports 3 (2013).Google ScholarGoogle Scholar
  14. Yves-Alexandre de Montjoye, Laura Radaelli, Vivek Kumar Singh, and others. 2015. Unique in the shopping mall: On the reidentifiability of credit card metadata. Science 347, 6221 (2015), 536--539.Google ScholarGoogle Scholar
  15. Yves-Alexandre de Montjoye, Erez Shmueli, Samuel S. Wang, and Alex Sandy Pentland. 2014. openPDS: Protecting the privacy of metadata through safeanswers. PloS ONE 9, 7 (2014), e98790.Google ScholarGoogle ScholarCross RefCross Ref
  16. Nathan Eagle, Michael Macy, and Rob Claxton. 2010. Network diversity and economic development. Science 328, 5981 (2010), 1029--1031.Google ScholarGoogle Scholar
  17. T. Farma and I. Cortivonis. 2000. Un questionario sul “locus of control”: Suo utilizzo nel contesto italiano (A questionnaire on the locus of control: Its use in the italian context). Ricerca in Psicoterapia 2 (2000).Google ScholarGoogle Scholar
  18. Joshua Fogel and Elham Nehmad. 2009. Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior 25, 1 (2009), 153--160. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Leo A. Goodman and others. 1961. Snowball sampling. The Annals of Mathematical Statistics 32, 1 (1961), 148--170.Google ScholarGoogle ScholarCross RefCross Ref
  20. James William Hardin, Joseph M. Hilbe, and Joseph Hilbe. 2007. Generalized Linear Models and Extensions. Stata Press.Google ScholarGoogle Scholar
  21. Mariea Grubbs Hoy and George Milne. 2010. Gender differences in privacy-related measures for young adult Facebook users. Journal of Interactive Advertising 10, 2 (2010), 28--45.Google ScholarGoogle ScholarCross RefCross Ref
  22. Gary Hsieh, Karen P. Tang, Wai Yong Low, and Jason I. Hong. 2007. Field deployment of IMBuddy: A study of privacy control and feedback mechanisms for contextual IM. In Ubiquitous Computing. Springer, 91--108. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Carlos Jensen, Colin Potts, and Christian Jensen. 2005. Privacy practices of internet users: Self-reports versus observed behavior. International Journal of Human-Computer Studies 63, 1 (2005), 203--227. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Iris A. Junglas, Norman A. Johnson, and Christiane Spitzmüller. 2008. Personality traits and concern for privacy: An empirical study in the context of location-based services. European Journal of Information Systems 17, 4 (2008), 387--402.Google ScholarGoogle ScholarCross RefCross Ref
  25. Bart P. Knijnenburg and Alfred Kobsa. 2013. Helping users with information disclosure decisions: Potential for adaptation. In Proceedings of the 2013 International Conference on Intelligent User Interfaces (IUI). ACM, 407--416. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Bart P. Knijnenburg, Alfred Kobsa, and Hongxia Jin. 2013. Dimensionality of information disclosure behavior. International Journal of Human-Computer Studies 71, 12 (2013), 1144--1162. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Melinda Korzaan, Nita Brooks, and Timothy Greer. 2009. Demystifying personality and privacy: An empirical investigation into antecedents of concerns for information privacy. Journal of Behavioral Studies in Business 1 (2009), 1--17.Google ScholarGoogle Scholar
  28. Nicholas D. Lane, Emiliano Miluzzo, Hong Lu, Daniel Peebles, Tanzeem Choudhury, and Andrew T. Campbell. 2010. A survey of mobile phone sensing. Communications Magazine, IEEE 48, 9 (2010), 140--150. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Marc Langheinrich. 2001. Privacy by design--principles of privacy-aware ubiquitous systems. In Proceedings of the International Conference on Ubiquitous Computing. Springer, 273--291. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Neal Lathia, Veljko Pejovic, Kiran K. Rachuri, Cecilia Mascolo, Mirco Musolesi, and Peter J. Rentfrow. 2013. Smartphones for large-scale behavior change interventions. IEEE Pervasive Computing 12, 3 (2013), 66--73. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Janice Lo. 2010. Privacy concern, locus of control, and salience in a trust-risk model of information disclosure on social networking sites. In Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, (AMCIS’10). Association for Information Systems, 110.Google ScholarGoogle Scholar
  32. Anmol Madan, Manuel Cebrian, Sai Moturu, Katayoun Farrahi, and Alex Pentland. 2012. Sensing the “health state” of a community. IEEE Pervasive Computing 11, 4 (2012), 36--45. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Paolo Massa, Chiara Leonardi, Bruno Lepri, Fabio Pianesi, and Massimo Zancanaro. 2015. If you are happy and you know it, say “I’m here”: Investigating parents’ location-sharing preferences. In Proceedings of the 15th IFIP TC.13 International Conference on Human-Computer Interaction (INTERACT’15). Springer, 315--332.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Roger C. Mayer and James H. Davis. 1999. The effect of the performance appraisal system on trust for management: A field quasi-experiment. Journal of Applied Psychology 84, 1 (1999), 123.Google ScholarGoogle ScholarCross RefCross Ref
  35. Emiliano Miluzzo, Nicholas D. Lane, Kristóf Fodor, Ronald Peterson, Hong Lu, Mirco Musolesi, Shane B. Eisenman, Xiao Zheng, and Andrew T. Campbell. 2008. Sensing meets mobile social networks: The design, implementation and evaluation of the cenceme application. In Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems. ACM, 337--350. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Corrado Moiso, Fabrizio Antonelli, and Michele Vescovi. 2012. How do I manage my personal data? - A telco perspective. In Proceedings of the International Conference on Data Technologies and Applications (DATA’12). SciTePress, 123--128.Google ScholarGoogle Scholar
  37. Min Mun, Shuai Hao, Nilesh Mishra, Katie Shilton, Jeff Burke, Deborah Estrin, Mark Hansen, and Ramesh Govindan. 2010. Personal data vaults: A locus of control for personal data streams. In Proceedings of the 6th International Conference on Emerging Networking EXperiments and Technologies (CoNEXT). ACM, 17. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Christos Perentis, Michele Vescovi, and Bruno Lepri. 2015. Investigating factors affecting personal data disclosure. In Proceedings of the 24th International Conference on World Wide Web (WWW’15). ACM, 89--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Marco Perugini and L. Di Blas. 2002. The Big Five Marker Scales (BFMS) and the Italian AB5C taxonomy: Analyses from an Emic-etic Perspective. Hogrefe 8 Huber Publishers.Google ScholarGoogle Scholar
  40. The Mobile Territorial Lab project. 2012. Mobile Territorial Lab. (Nov. 2012). Retrieved October 28, 2016 from http://www.mobileterritoriallab.eu/.Google ScholarGoogle Scholar
  41. Daniele Quercia, Diego B. Las Casas, João Paulo Pesce, David Stillwell, Michal Kosinski, Virgílio A. F. Almeida, and Jon Crowcroft. 2012. Facebook and privacy: The balancing act of personality, gender, and relationship currency. In Proceedings of the 6th International Conference on Weblogs and Social Media. AAAI Press.Google ScholarGoogle Scholar
  42. Jeffrey Rosen. 2012. The right to be forgotten. Stanford Law Review Online 64 (2012), 88.Google ScholarGoogle Scholar
  43. Luca Rossi and Mirco Musolesi. 2014. It’s the way you check-in: Identifying users in location-based social networks. In Proceedings of the 2nd ACM Conference on Online Social Networks (COSN’14). ACM, New York, NY, 215--226. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Luca Rossi and Mirco Musolesi. 2015. Spatio-temporal techniques for user identification by means of GPS mobility data. EPJ Data Science 4, 11 (August 2015).Google ScholarGoogle ScholarCross RefCross Ref
  45. Julian B. Rotter. 1966. Generalized expectancies for internal versus external control of reinforcement. Psychological Monographs: General and Applied 80, 1 (1966), 1.Google ScholarGoogle ScholarCross RefCross Ref
  46. Julian B. Rotter. 1967. A new scale for the measurement of interpersonal trust. Journal of Personality 35, 4 (1967), 651--665.Google ScholarGoogle ScholarCross RefCross Ref
  47. Johann Schrammel, Christina Köffel, and Manfred Tscheligi. 2009. Personality traits, usage patterns and information disclosure in online communities. In Proceedings of the 23rd British HCI Group Annual Conference on People and Computers: Celebrating People and Technology. British Computer Society, 169--174. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. H. Jeff Smith, Sandra J. Milberg, and Sandra J. Burke. 1996. Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quarterly (1996), 167--196. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Jacopo Staiano, Nuria Oliver, Bruno Lepri, Rodrigo de Oliveira, Michele Caraviello, and Nicu Sebe. 2014. Money walks: A human-centric study on the economics of personal mobile data. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 583--594. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Panagiotis Symeonidis and Christos Perentis. 2014. Link prediction in multi-modal social networks. In Proceedings of the Joint European Conference on Machine Learning and Knowledge Discovery in Databases (ECML-PKDD’14). Springer, 147--162.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Karen P. Tang, Pedram Keyani, James Fogarty, and Jason I. Hong. 2006. Putting people in their place: An anonymous and privacy-sensitive approach to collecting sensed data in location-based applications. In Proccedings of the SIGCHI Conference on Human Factors in Computer Systems. ACM, 93--102. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Michele Vescovi, Christos Perentis, Chiara Leonardi, Bruno Lepri, and Corrado Moiso. 2014. My data store: Toward user awareness and control on personal data. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp’14 Adjunct). ACM, New York, NY, USA, 179--182. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Lawrence R. Wheeless and Jams Grotz. 1976. Conceptualization and measurement of reported self-disclosure. Human Communication Research 2, 4 (1976), 338--346.Google ScholarGoogle ScholarCross RefCross Ref
  54. Jason Wiese, Patrick Gage Kelley, Lorrie Faith Cranor, Laura Dabbish, Jason I. Hong, and John Zimmerman. 2011. Are you close with me? Are you nearby? Investigating social groups, closeness, and willingness to share. In Proceedings of the 13th International Conference on Ubiquitous Computing. ACM, 197--206. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Alyson L. Young and Anabel Quan-Haase. 2009. Information revelation and internet privacy concerns on social network sites: A case study of Facebook. In Proceedings of the 4th International Conference on Communities and Technologies. ACM, 265--274. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Anonymous or Not? Understanding the Factors Affecting Personal Mobile Data Disclosure

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Internet Technology
        ACM Transactions on Internet Technology  Volume 17, Issue 2
        Special Issue on Advances in Social Computing and Regular Papers
        May 2017
        249 pages
        ISSN:1533-5399
        EISSN:1557-6051
        DOI:10.1145/3068849
        • Editor:
        • Munindar P. Singh
        Issue’s Table of Contents

        Copyright © 2017 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 23 March 2017
        • Accepted: 1 November 2016
        • Revised: 1 October 2016
        • Received: 1 February 2016
        Published in toit Volume 17, Issue 2

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader