Skip to main content Accessibility help
×
Hostname: page-component-cd9895bd7-p9bg8 Total loading time: 0 Render date: 2024-12-26T17:20:48.713Z Has data issue: false hasContentIssue false

5 - Mobile Privacy Expectations

How Privacy Is Respected with Mobile Devices

from Part II - The Pervasiveness and Value of Tracking Technologies

Published online by Cambridge University Press:  18 April 2018

Evan Selinger
Affiliation:
Rochester Institute of Technology, New York
Jules Polonetsky
Affiliation:
Future of Privacy Forum
Omer Tene
Affiliation:
International Association of Privacy Professionals
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2018

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Adjerid, I., Acquisti, A., & Loewenstein, G. (2016). Choice architecture, framing, and layered privacy choices. Framing, and Layered Privacy Choices. Available at SSRN: https://ssrn.com/abstract=2765111.Google Scholar
Ahern, S., Eckles, D., Good, N. S., King, S., Naaman, M., & Nair, R. (2007). Over-exposed?: Privacy patterns and considerations in online and mobile photo sharing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 357–366). ACM. Retrieved from http://dl.acm.org/citation.cfm?id=1240683.Google Scholar
Anthony, D., Kotz, D., & Henderson, T. (2007). Privacy in location-aware computing environments. Pervasive Computing, 6(4), 6472.Google Scholar
Balebako, R., Leon, P. G., Almuhimedi, H., Kelley, P. G., Mugan, J., Acquisti, A., … Sadeh, N. (2011). Nudging users towards privacy on mobile devices. In Proceedings of the CHI 2011 Workshop on Persuasion, Nudge, Influence and Coercion.Google Scholar
Balebako, R., Marsh, A., Lin, J., Hong, J., & Cranor, L. F. (2014). The privacy and security behaviors of smartphone app developers. In USEC ’14. San Diego, CA: Internet Society. Retrieved from http://lorrie.cranor.org/pubs/usec14-app-developers.pdf.Google Scholar
Balebako, R., Schaub, F., Adjerid, I., Acquisti, A., & Cranor, L. F. (2015). The impact of timing on the salience of smartphone app privacy notices. In Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (pp. 63–74). ACM.CrossRefGoogle Scholar
Barkhuus, L., & Dey, A. (2003). Location-based services for mobile telephony: A study of users’ privacy concerns. In Proceedings of the INTERACT 2003: 9TH IFIP TC13 International Conference on Human-Computer Interaction (Vol. 2003, pp. 709–712).Google Scholar
Beales, J. H., & Muris, T. J. (2008). Choice or consequences: Protecting privacy in commercial information. The University of Chicago Law Review, 75(1), 109135.Google Scholar
Beilinson, J. (2016, July 28). Glow pregnancy app exposed women to privacy threats, Consumer Reports finds. Consumer Reports. Retrieved from http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/.Google Scholar
Bellware, K. (2016, January 6). Uber settles investigation into creepy “God View” tracking program. The Huffington Post. Retrieved from http://www.huffingtonpost.com/entry/uber-settlement-god-view_us_568da2a6e4b0c8beacf5a46a.Google Scholar
Benn, S. I. (1984). Privacy, freedom, and respect for persons. In Schoeman, F. (Ed.), Philosophical dimensions of privacy. (pp. 223244). Cambridge, MA: Cambridge University Press.Google Scholar
Bentham, J. (1791). Panopticon or the inspection house (Vol. 2). Retrieved from http://sites.scran.ac.uk/ada/documents/castle_style/bridewell/bridewell_jeremy_bentham_panoption_vol1.htm.Google Scholar
Bloustein, E. J. (1964). Privacy as an aspect of human dignity: An answer to Dean Prosser. NYU Law Review, 39, 962.Google Scholar
Bowie, N. E., & Jamal, K. (2006). Privacy rights on the internet: Self-regulation or government regulation? Business Ethics Quarterly, 16(3), 323342.CrossRefGoogle Scholar
Boyd, D., & Crawford, K. (2012). Critical questions for big data. Information, Communication & Society, 15(5), 662679.Google Scholar
Brunton, F., & Nissenbaum, H. (2011). Vernacular resistance to data collection and analysis: A political theory of obfuscation. First Monday, 16(5). Available at: http://www.ojphi.org/ojs/index.php/fm/article/view/3493/2955.Google Scholar
Bureau of Consumer Protection. (2013, February). Mobile App Developers: Start with security. Retrieved June 21, 2013, from http://business.ftc.gov/documents/bus83-mobile-app-developers-start-security.Google Scholar
Calo, R. (2016). Can Americans resist surveillance? The University of Chicago Law Review, 83(1), 2343.Google Scholar
Cohen, J. E. (2008). Privacy, visibility, transparency, and exposure. The University of Chicago Law Review, 75(1), 181201.Google Scholar
Coutts, S. (2016, May 25). Anti-choice groups use smartphone surveillance to target “abortion-minded women” during clinic visits. Rewire. Retrieved from https://rewire.news/article/2016/05/25/anti-choice-groups-deploy-smartphone-surveillance-target-abortion-minded-women-clinic-visits/.Google Scholar
Cravens, A. (2012, September 26). A demographic and business model analysis of today’s app developer. Retrieved March 19, 2013, from http://pro.gigaom.com/2012/09/a-demographic-and-business-model-analysis-of-todays-app-developer/.Google Scholar
Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59(2), 323342.Google Scholar
Culnan, M. J., & Williams, C. C. (2009). How ethics can enhance organizational privacy: Lessons from the ChoicePoint and TJX data breaches. Management Information Systems Quarterly, 33(4), 6.Google Scholar
Curry, M. R. (2002). Discursive displacement and the seminal ambiguity of space and place. In Lievrouw, L. & Livingstone, S. (Eds.), Handbook of new media. (pp. 502517). London: Sage Publications.Google Scholar
Decker, M. (2008). Location privacy: An overview. In Proceedings of the 2008 7th International Conference on Mobile Business (pp. 221230). Barcelona: IEEE Computer Society Press. Retrieved from http://csdl2.computer.org/persagen/DLAbsToc.jsp?resourcePath=/dl/proceedings/&toc=comp/proceedings/icmb/2008/3260/00/3260toc.xml&DOI=10.1109/ICMB.2008.14.Google Scholar
Estrin, D. (2014). Small data, where n = me. Communications of the ACM, 57(4), 3234. http://doi.org/10.1145/2580944.Google Scholar
Federal Trade Commission (2012). Protecting consumer privacy in an era of rapid change: Recommendations for businesses and policymakers. Washington, DC: Federal Trade Commission.Google Scholar
Foucault, M. (1977). Discipline and punish: The birth of the prison. New York: Random House LLC.Google Scholar
Fried, C. (1970). An anatomy of values: Problems of personal and social choice. Cambridge, MA: Harvard University Press.CrossRefGoogle Scholar
Friedman, B., & Nissenbaum, H. (1996). Bias in computer systems. ACM Transactions on Information Systems (TOIS), 14(3), 330347.Google Scholar
Future of Privacy Forum, & Center for Democracy & Technology. (2012). Best practices for mobile application developers. Washington, DC: Future of Privacy Forum. Retrieved from http://www.futureofprivacy.org/wp-content/uploads/Best-Practices-for-Mobile-App-Developers_Final.pdf.Google Scholar
Google Play (2016, July 2). Google Play developer distribution agreement. Retrieved August 9, 2016, from https://play.google.com/intl/ALL_us/about/developer-distribution-agreement.html.Google Scholar
Hartzog, W., & Selinger, E. (2015). Surveillance as loss of obscurity. Washington and Lee Law Review, 72(3), 1343.Google Scholar
He, Q., Wu, D., & Khosla, P. (2004). The quest for personal control over mobile location privacy. IEEE Communications Magazine, 42(5), 130136.Google Scholar
Hill, K. (2016, February 12). How this company tracked 16,000 Iowa caucus-goers via their phones. Retrieved from https://www.huffingtonpost.com/entry/dstillery-iowa-caucus_us_56c12cafe4b08ffac125b591.Google Scholar
Jones, M. L. (2016). Ctrl + z: The right to be forgotten. New York and London: New York University Press.Google Scholar
Kang, C. (2013, December 6). Flashlight app kept users in the dark about sharing location data: FTC. The Washington Post. Retrieved from http://www.washingtonpost.com/business/technology/flashlight-app-kept-users-in-the-dark-about-sharing-location-data-ftc/2013/12/05/1be26fa6-5dc7-11e3-be07-006c776266ed_story.html.Google Scholar
Kerr, O. S. (2009). The case for the third-party doctrine. Michigan Law Review, 107, 561601.Google Scholar
Kerr, O. S. (2012). The Mosaic Theory of the Fourth Amendment. Michigan Law Review, 110, 311354.Google Scholar
Khalil, A., & Connelly, K. (2006). Context-aware telephony: Privacy preferences and sharing patterns. In Proceedings of the 2006 20th anniversary conference on computer supported cooperative work (pp. 469478). New York: ACM. Retrieved from http://dl.acm.org/citation.cfm?id=1180947Google Scholar
King, J. (2014). Taken out of context: An empirical analysis of Westin’s privacy scale. In Symposium on Usable Privacy and Security (SOUPS) 2014. Menlo Park, CA: ACM.Google Scholar
Lella, A., & Lipsman, A. (2015). The 2015 U.S. Mobile App Report. Retrieved from http://www.comscore.com/Insights/Presentations-and-Whitepapers/2015/The-2015-US-Mobile-App-Report.Google Scholar
Leon, P. G., Cranor, L. F., McDonald, A. M., & McGuire, R. (2010). Token attempt: The misrepresentation of website privacy policies through the misuse of p3p compact policy tokens. In Proceedings of the 9th annual ACM workshop on privacy in the electronic society (pp. 93104). New York: ACM.Google Scholar
Leon, P. G., Cranshaw, J., Cranor, L. F., Graves, J., Hastak, M., Ur, B., & Xu, G. (2012). What do online behavioral advertising privacy disclosures communicate to users? In Proceedings of the 2012 ACM workshop on privacy in the electronic society (pp. 1930). New York: ACM.Google Scholar
Li, H., Sarathy, R., & Xu, H. (2010). Understanding situational online information disclosure as a privacy calculus. Journal of Computer Information Systems, 51(1), 62.Google Scholar
Lin, J., Amini, S., Hong, J. I., Sadeh, N., Lindqvist, J., & Zhang, J. (2012). Expectation and purpose: Understanding users’ mental models of mobile app privacy through crowdsourcing. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (pp. 501510). New York: ACM. http://doi.org/10.1145/2370216.2370290.Google Scholar
Liptak, A. (2014, June 25). Supreme Court says phones can’t be searched without a warrant. The New York Times. Retrieved from http://www.nytimes.com/2014/06/26/us/supreme-court-cellphones-search-privacy.html.Google Scholar
Mancini, C., Thomas, K., Rogers, Y., Price, B. A., Jedrzejczyk, L., Bandara, A. K., … Nuseibeh, B. (2009). From spaces to places: Emerging contexts in mobile privacy. New York: ACM Press. http://doi.org/10.1145/1620545.1620547.Google Scholar
Martin, K. (2017). Do privacy notices matter? Comparing the impact of violating formal privacy notices and informal privacy norms on consumer trust online. Journal of Legal Studies, 45(S2), 191215.Google Scholar
Martin, K. (2013). Transaction costs, privacy, and trust: The laudable goals and ultimate failure of notice and choice to respect privacy online. First Monday, 18(12).Google Scholar
Martin, K. (2015). Ethical issues in the big data industry. MIS Quarterly Executive, 14(2): 6785.Google Scholar
Martin, K. (2016a). Understanding privacy online: Development of a social contract approach to privacy. Journal of Business Ethics, 137(3), 551569.Google Scholar
Martin, K. (2016b). Data aggregators, consumer data, and responsibility online: Who is tracking consumers online and should they stop? The Information Society, 32(1), 5163.CrossRefGoogle Scholar
Martin, K. (2012). Diminished or just different? A factorial vignette study of privacy as a social contract. Journal of Business Ethics, 111(4), 519539. http://doi.org/10.1007/s10551–012–1215–8.Google Scholar
Martin, K. E., & Shilton, K. (2015). Why experience matters to privacy: How context-based experience moderates consumer privacy expectations for mobile applications. Journal of the Association for Information Science and Technology, 67(8), 18711882.Google Scholar
Martin, K. E., & Shilton, K. (2016). Putting mobile application privacy in context: An empirical study of user privacy expectations for mobile devices. The Information Society, 32(3), 200216. http://doi.org/10.1080/01972243.2016.1153012.Google Scholar
Martin, K., & Nissenbaum, H. (2016). Measuring privacy: Using context to expose confounding variables. Columbia Science and Technology Law Review. Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2709584.Google Scholar
Martínez-Pérez, B., Torre-Díez, I. de la, & López-Coronado, M. (2014). Privacy and security in mobile health apps: A review and recommendations. Journal of Medical Systems, 39(1), 181. http://doi.org/10.1007/s10916–014–0181–3.Google Scholar
McDonald, A. M., & Cranor, L. F. (2008). The cost of reading privacy policies. I/S: A Journal of Law and Policy for the Information Society, 4(3), 543.Google Scholar
Metcalf, J., & Crawford, K. (2016). Where are human subjects in Big Data research? The emerging ethics divide. Big Data & Society, 3(1). https://doi.org/10.1177/2053951716650211.Google Scholar
Michael, K., & Clarke, R. (2013). Location and tracking of mobile devices: Überveillance stalks the streets. Computer Law & Security Review, 29(3), 216228.Google Scholar
Milne, G. R., & Culnan, M. J. (2002). Using the content of online privacy notices to inform public policy: A longitudinal analysis of the 1998–2001 US web surveys. The Information Society, 18(5), 345359.Google Scholar
Milne, G. R., Culnan, M. J., & Greene, H. (2006). A longitudinal assessment of online privacy notice readability. Journal of Public Policy & Marketing, 25(2), 238249.CrossRefGoogle Scholar
Mulligan, D. K., & Bamberger, K. A. (2013). What regulators can do to advance privacy through design. Communications of the ACM, 56(11), 2022.Google Scholar
Mulligan, D. K., & King, J. (2011). Bridging the gap between privacy and design. University of Pennsylvania Journal of Constitutional Law, 14 (4), 989.Google Scholar
National Science and Technology Council. (2016). National privacy research strategy. Washington, DC: National Science and Technology Council.Google Scholar
Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79(1), 119158.Google Scholar
Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford, CA: Stanford University Press.Google Scholar
Nissenbaum, H. (2011). A contextual approach to privacy online. Daedalus, 140(4), 3248.Google Scholar
Nissenbaum, H., & Brunton, F. (2015). Obfuscation: A user’s guide for privacy and protest. Cambridge, MA: MIT Press.Google Scholar
Palen, L., & Dourish, P. (2003). Unpacking “privacy” for a networked world. In CHI 2003 (Vol. 5, pp. 129136). Ft. Lauderdale, FL: ACM.Google Scholar
Pell, S. K., & Soghoian, C. (2012). Can you see me now?: Toward reasonable standards for law enforcement access to location data that Congress could enact. Berkeley Technology Law Journal, 27(1), 117195.Google Scholar
Rachels, J. (1975). Why privacy is important. Philosophy & Public Affairs, 4(4), 323333.Google Scholar
Richards, N. M., & King, J. H. (2016). Big data and the future for privacy. In Olleros, F. X. & Zhegu, M. (Eds.), Research handbook on digital transformations. (p. 272). Northhampton, MA: Edward Elgar Publishing.Google Scholar
Rosen, J. (2011). The unwanted gaze: The destruction of privacy in America. New York: Vintage Books.Google Scholar
Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., & Rao, J. (2009). Understanding and capturing people’s privacy policies in a mobile social networking application. Personal and Ubiquitous Computing, 13(6), 401412.CrossRefGoogle Scholar
Schaub, F., Balebako, R., Durity, A. L., & Cranor, L. F. (2015). A design space for effective privacy notices. In Proceedings of the Eleventh Symposium On Usable Privacy and Security (SOUPS 2015) (pp. 1–17).Google Scholar
Shilton, K. (2009). Four billion little brothers?: Privacy, mobile phones, and ubiquitous data collection. Communications of the ACM, 52(11), 4853. http://doi.org/10.1145/1592761.1592778.Google Scholar
Shilton, K., & Greene, D. (2017). Linking platforms, practices, and developer ethics: levers for privacy discourse in mobile application development. Journal of Business Ethics (online first). https://doi.org/10.1007/s10551-017-3504-8.Google Scholar
Shilton, K., Koepfler, J. A., & Fleischmann, K. R. (2013). Charting sociotechnical dimensions of values for design research. The Information Society, 29(5), 259271.Google Scholar
Simonite, T. (2016, August 3). Breakthrough privacy technology invented by Microsoft gets its first big test thanks to Apple. MIT Technology Review. Retrieved August 10, 2016, from https://www.technologyreview.com/s/602046/apples-new-privacy-technology-may-pressure-competitors-to-better-protect-our-data/?imm_mid=0e6973&cmp=em-data-na-na-newsltr_20160810.Google Scholar
Smith, A. (2015, April 1). U.S. smartphone use in 2015. Retrieved from www.pewinternet.org/2015/04/01/us-smartphone-use-in-2015/.Google Scholar
Soghoian, C. (2011, April 22). How can US law enforcement agencies access location data stored by Google and Apple? Retrieved April 23, 2011, from http://paranoia.dubfire.net/2011/04/how-can-us-law-enforcement-agencies.html.Google Scholar
Solove, D. J., & Hartzog, W. (2014). The FTC and the new common law of privacy. Columbia Law Review, 114: 583676.Google Scholar
Stingray tracking devices: Who’s got them? (2016). Retrieved August 19, 2016, from https://www.aclu.org/map/stingray-tracking-devices-whos-got-themGoogle Scholar
Strandburg, K. J. (2011). Home, home on the web: The Fourth Amendment and technosocial change. Maryland Law Review, 3, 614680.Google Scholar
Strickling, L. (2012, June 15). Putting the Consumer Privacy Bill of Rights into practice. Retrieved from http://www.ntia.doc.gov/blog/2012/putting-consumer-privacy-bill-rights-practice.Google Scholar
Turow, J., Hennessy, M., & Draper, N. (2015). The tradeoff fallacy: How marketers are misrepresenting American consumers and opening them up to exploitation (pp. 124). Annenburg School of Communication. Retrieved from https://www.asc.upenn.edu/sites/default/files/TradeoffFallacy_1.pdf.Google Scholar
Turow, J., King, J., Hoofnagle, C. J., Bleakley, A., & Hennessy, M. (2009). Americans reject tailored advertising and three activities that enable it. Available at SSRN at https://ssrn.com/abstract=1478214 or http://dx.doi.org/10.2139/ssrn.1478214.Google Scholar
Ur, B., Leon, P. G., Cranor, L. F., Shay, R., & Wang, Y. (2012). Smart, useful, scary, creepy: Perceptions of online behavioral advertising. In Proceedings of the 8th symposium on usable privacy and security (p. 4). ACM.Google Scholar
Urban, J. M., Hoofnagle, C. J., & Li, S. (2012). Mobile phones and privacy (BCLT Research Paper Series). Berkeley, CA: University of California at Berkeley - Center for the Study of Law and Society. Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2103405.Google Scholar
Vitak, J., Shilton, K., & Ashktorab, Z. (2016). Beyond the Belmont principles: Ethical challenges, practices, and beliefs in the online data research community. In Proceedings of the 19th ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW 2016). San Francisco, CA: ACM.Google Scholar
Volz, D. (2016, May 31). U.S. court says no warrant needed for cellphone location data. Reuters. Retrieved from http://www.reuters.com/article/us-usa-court-mobilephones-idUSKCN0YM2CZGoogle Scholar
Westin, A. F. (1970). Privacy and freedom. New York: Atheneum.Google Scholar
Xu, H., Zhang, C., Shi, P., & Song, P. (2009). Exploring the role of overt vs. covert personalization strategy in privacy calculus. Academy of Management Proceedings, 2009(1), 16. http://doi.org/10.5465/AMBPP.2009.44249857.Google Scholar
Zang, J., Dummit, K., Graves, J., Lisker, P., & Sweeney, L. (2015). Who knows what about me? A survey of behind the scenes personal data sharing to third parties by mobile apps. Journal of Technology Science, 30. Retrieved from http://jots.pub/a/2015103001/.Google Scholar
Zimmer, M. (2010). “But the data is already public”: On the ethics of research in Facebook. Ethics and Information Technology, 12(4), 313325.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure no-reply@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×