Leveraging automated privacy checking for design of mobile privacy protection mechanisms

While mobile platforms rely on developers to follow good practices in privacy design, developers might not always adhere. In addition, it is often difficult for users to understand the privacy behaviour of their applications without some prolonged usage. To aid in these issues, we describe on-going...

Full description

Saved in:
Bibliographic Details
Main Authors: CHAN, Joseph Joo Keng, JIANG, Lingxiao, TAN, Kiat Wee, BALAN, Rajesh
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2016
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/3513
https://ink.library.smu.edu.sg/context/sis_research/article/4514/viewcontent/CHI_Workshop_Camera_Ready_Leveraging_Automated_Privacy_Checking.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-4514
record_format dspace
spelling sg-smu-ink.sis_research-45142020-03-24T03:53:25Z Leveraging automated privacy checking for design of mobile privacy protection mechanisms CHAN, Joseph Joo Keng JIANG, Lingxiao TAN, Kiat Wee BALAN, Rajesh While mobile platforms rely on developers to follow good practices in privacy design, developers might not always adhere. In addition, it is often difficult for users to understand the privacy behaviour of their applications without some prolonged usage. To aid in these issues, we describe on-going research to improve privacy protection by utilizing techniques that mine privacy information from application binaries as a grey-box (Automated Privacy Checking). The outputs can then be utilized to improve the users' ability to exercise privacy-motivated discretion. We conducted a user study to observe the effects of presenting information on leak-causing triggers within applications in the form of privacy message overlays. We found that while users' prior usage time largely determined their usage behaviour, presenting trigger information helped users who disapproved with data use and had sufficient understanding of the implications of data leaks. Users' inherent level of privacy consciousness and surprise levels were also factors in ensuring the effectiveness of messages. 2016-05-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/3513 https://ink.library.smu.edu.sg/context/sis_research/article/4514/viewcontent/CHI_Workshop_Camera_Ready_Leveraging_Automated_Privacy_Checking.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University mobile privacy binary analysis user-behavioural factors Information Security Software Engineering
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic mobile privacy
binary analysis
user-behavioural factors
Information Security
Software Engineering
spellingShingle mobile privacy
binary analysis
user-behavioural factors
Information Security
Software Engineering
CHAN, Joseph Joo Keng
JIANG, Lingxiao
TAN, Kiat Wee
BALAN, Rajesh
Leveraging automated privacy checking for design of mobile privacy protection mechanisms
description While mobile platforms rely on developers to follow good practices in privacy design, developers might not always adhere. In addition, it is often difficult for users to understand the privacy behaviour of their applications without some prolonged usage. To aid in these issues, we describe on-going research to improve privacy protection by utilizing techniques that mine privacy information from application binaries as a grey-box (Automated Privacy Checking). The outputs can then be utilized to improve the users' ability to exercise privacy-motivated discretion. We conducted a user study to observe the effects of presenting information on leak-causing triggers within applications in the form of privacy message overlays. We found that while users' prior usage time largely determined their usage behaviour, presenting trigger information helped users who disapproved with data use and had sufficient understanding of the implications of data leaks. Users' inherent level of privacy consciousness and surprise levels were also factors in ensuring the effectiveness of messages.
format text
author CHAN, Joseph Joo Keng
JIANG, Lingxiao
TAN, Kiat Wee
BALAN, Rajesh
author_facet CHAN, Joseph Joo Keng
JIANG, Lingxiao
TAN, Kiat Wee
BALAN, Rajesh
author_sort CHAN, Joseph Joo Keng
title Leveraging automated privacy checking for design of mobile privacy protection mechanisms
title_short Leveraging automated privacy checking for design of mobile privacy protection mechanisms
title_full Leveraging automated privacy checking for design of mobile privacy protection mechanisms
title_fullStr Leveraging automated privacy checking for design of mobile privacy protection mechanisms
title_full_unstemmed Leveraging automated privacy checking for design of mobile privacy protection mechanisms
title_sort leveraging automated privacy checking for design of mobile privacy protection mechanisms
publisher Institutional Knowledge at Singapore Management University
publishDate 2016
url https://ink.library.smu.edu.sg/sis_research/3513
https://ink.library.smu.edu.sg/context/sis_research/article/4514/viewcontent/CHI_Workshop_Camera_Ready_Leveraging_Automated_Privacy_Checking.pdf
_version_ 1770573258182098944