Leveraging automated privacy checking for design of mobile privacy protection mechanisms
While mobile platforms rely on developers to follow good practices in privacy design, developers might not always adhere. In addition, it is often difficult for users to understand the privacy behaviour of their applications without some prolonged usage. To aid in these issues, we describe on-going...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2016
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/3513 https://ink.library.smu.edu.sg/context/sis_research/article/4514/viewcontent/CHI_Workshop_Camera_Ready_Leveraging_Automated_Privacy_Checking.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-4514 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-45142020-03-24T03:53:25Z Leveraging automated privacy checking for design of mobile privacy protection mechanisms CHAN, Joseph Joo Keng JIANG, Lingxiao TAN, Kiat Wee BALAN, Rajesh While mobile platforms rely on developers to follow good practices in privacy design, developers might not always adhere. In addition, it is often difficult for users to understand the privacy behaviour of their applications without some prolonged usage. To aid in these issues, we describe on-going research to improve privacy protection by utilizing techniques that mine privacy information from application binaries as a grey-box (Automated Privacy Checking). The outputs can then be utilized to improve the users' ability to exercise privacy-motivated discretion. We conducted a user study to observe the effects of presenting information on leak-causing triggers within applications in the form of privacy message overlays. We found that while users' prior usage time largely determined their usage behaviour, presenting trigger information helped users who disapproved with data use and had sufficient understanding of the implications of data leaks. Users' inherent level of privacy consciousness and surprise levels were also factors in ensuring the effectiveness of messages. 2016-05-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/3513 https://ink.library.smu.edu.sg/context/sis_research/article/4514/viewcontent/CHI_Workshop_Camera_Ready_Leveraging_Automated_Privacy_Checking.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University mobile privacy binary analysis user-behavioural factors Information Security Software Engineering |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
mobile privacy binary analysis user-behavioural factors Information Security Software Engineering |
spellingShingle |
mobile privacy binary analysis user-behavioural factors Information Security Software Engineering CHAN, Joseph Joo Keng JIANG, Lingxiao TAN, Kiat Wee BALAN, Rajesh Leveraging automated privacy checking for design of mobile privacy protection mechanisms |
description |
While mobile platforms rely on developers to follow good practices in privacy design, developers might not always adhere. In addition, it is often difficult for users to understand the privacy behaviour of their applications without some prolonged usage. To aid in these issues, we describe on-going research to improve privacy protection by utilizing techniques that mine privacy information from application binaries as a grey-box (Automated Privacy Checking). The outputs can then be utilized to improve the users' ability to exercise privacy-motivated discretion. We conducted a user study to observe the effects of presenting information on leak-causing triggers within applications in the form of privacy message overlays. We found that while users' prior usage time largely determined their usage behaviour, presenting trigger information helped users who disapproved with data use and had sufficient understanding of the implications of data leaks. Users' inherent level of privacy consciousness and surprise levels were also factors in ensuring the effectiveness of messages. |
format |
text |
author |
CHAN, Joseph Joo Keng JIANG, Lingxiao TAN, Kiat Wee BALAN, Rajesh |
author_facet |
CHAN, Joseph Joo Keng JIANG, Lingxiao TAN, Kiat Wee BALAN, Rajesh |
author_sort |
CHAN, Joseph Joo Keng |
title |
Leveraging automated privacy checking for design of mobile privacy protection mechanisms |
title_short |
Leveraging automated privacy checking for design of mobile privacy protection mechanisms |
title_full |
Leveraging automated privacy checking for design of mobile privacy protection mechanisms |
title_fullStr |
Leveraging automated privacy checking for design of mobile privacy protection mechanisms |
title_full_unstemmed |
Leveraging automated privacy checking for design of mobile privacy protection mechanisms |
title_sort |
leveraging automated privacy checking for design of mobile privacy protection mechanisms |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2016 |
url |
https://ink.library.smu.edu.sg/sis_research/3513 https://ink.library.smu.edu.sg/context/sis_research/article/4514/viewcontent/CHI_Workshop_Camera_Ready_Leveraging_Automated_Privacy_Checking.pdf |
_version_ |
1770573258182098944 |