Mobile Usage Patterns and Privacy Implications Michael Mitchell March 27, 2015

advertisement
Mobile Usage Patterns
and Privacy Implications
Michael Mitchell
March 27, 2015
Ratnesh Patidar, Manik Saini, Parteek
Singh, An-I Wang
Florida State University
Peter Reiher
University of California, Los
Angeles
1
Introduction
• Privacy is a major concern for pervasive &
mobile computing
• Current understanding incomplete
– Subjective nature of privacy
– Automatic detection limited
• Important to understand what privacy actually
means to people
– Make the right tools to fix the right problems
2
Overview
• Empirical data on user privacy behavior limited
• Conducted a survey-based study of ~600 users
• Major findings include:
– (1) People exercise little caution preserving mobile
privacy
– (2) Privacy is not equal to trust
– (3) Users underestimate mobile app privacy threats
– (4) Users’ understanding of privacy is different from
that of the security community
3
Research Questions
• Primary survey goal: examine how mobile users feel
about privacy
– What does it mean to be private?
– Do users alter computing behavior in certain environments?
Around certain people?
• Secondary goal: understand user behavior and general
mobility patterns
– Where, when, and how mobile devices are used
– Does gender, ethnicity, age, income, choices of technology,
or technical sophistication influence behavior?
4
Background & Early Challenges
•
•
•
•
Privacy subjective, requires human interaction
Human Subject (IRB) Approval
Participant recruitment
Participant motivation and compensation
5
Mobile Usage Questionnaire
• ~100 questions in total via mobile app & web
• Questions cover:
– Background, demographics, hardware ownership
– Computing tasks performed by location in public
and private
– Where/when/why behavior changes
– Usage of privacy/security tools
• $1000 was allocated for prizes
– Chance to win one of 66 $15 Starbucks gift cards
6
Participant Demographics
• FSU Survey
– 292 total participants
– Median age of 22; 6 years computing experience
• Craigslist Survey
– 303 total participants
– Median age of 27; 6 years computing experience
• Few differences observed between surveys
– Unless otherwise noted all results reflective of
combined 595 responses
7
Participant Demographics
0%
% of participants
25%
50%
75%
100%
Gender
FSU participants
FSU demographics
Craigslist participants
Overall participants
US Census
FSU participants
Ethnicity
Male
Female
FSU demographics
Native American
Asian/Pacific Islander
Hispanic/Latino
African American
Caucasian
Craigslist participants
Overall participants
US Census
8
Device Market Share
• Phones & tablets of survey participants reflect
U.S. market share
– Within 7% of target demographics
– Slightly more Apple, slightly fewer Android
• Not quite as reflective of laptops
– Fewer Windows users (by 28%)
– More Apple (by 21%) and Linux users (by 7%)
9
Device Ownership
• Does hardware preference play a role in
mobility or privacy?
– Relationship between brands and behaviors?
• Men, tech-savvy users, and minorities
– Own Android devices (up to 20%)
– Own Windows laptops (up to 19%)
10
Brand Homogeneity
• Participant brand loyalty
– iPhone owners more frequently own an Apple
laptop or tablet (by up to 28%)
– Android owners more frequently own an Android
tablet (by 15%)
• More pronounced in FSU data set
– iPhone owners more frequently own Apple laptops
and tablets (by up to 40%)
11
Computing Locations
Home
Class
Library
Waiting In Line
Restaurant
Bus/Train/Airplane
Air/Bus/Train Station
Office
Park
Exercising
Washroom
0%
10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
12
% of participants
Most Common Public & Private Tasks
Text Message
Email
Browse Web
Social Networking
Listen To Music
Private
Public
Weather
Calendar
Top 5 tasks significantly more frequent
Most have little difference in public/private
Take Photos
Play Games
Voice Chat
0
50
100
150
200
250
# of accesses per person, per month
300
13
Categorical Public & Private Tasks
Entertainment
Communication
Productivity
Top 2 categories significantly more frequent
Tools
Private
Public
Financial
Most have little difference in public/private
Administration
Personal
0
200
400
600
800
# of accesses per person, per month
1000
14
Public & Private Tasks by Risk Level
Low Risk
More often in private
Medium Risk
Private
Public
Little difference in public/private?
High Risk
0
200
400
600
800
1000
1200
# of accesses per person, per month
1400
15
Public & Private Activity Overall
• Behavioral differences in public and private
among groups not statistically significant
– Genders, technical backgrounds, and ethnicities
• A few exceptions:
– Women use social networking more frequently
than men in public and private (up to 40%)
– Tech-savvy users more likely to email in public
and private (up to 24%),
16
Who Makes Users Change Behavior?
Parents
Boss
Friends
Significant Other
Children
More familiar
Siblings
Local Strangers
Someone Tech Savvy
Roommates
> 10% Never change behavior
Less familiar
Foreign Strangers
Subordinates
None
0%
10%
20%
30%
40%
50%
% of users who alter their behavior
60%
17
Usage of Privacy Enhancing Tools
0%
Encryption
Overall
Male, tech
Female, tech
Male, non-tech
Password
Vault/Keychain
Female, non-tech
20%
% of participants
40%
60%
80%
100%
Technical
background
more likely to
encrypt
Has used
Never used
Unsure
Overall
Male, tech
Female, tech
Differences less
pronounced for
password vaults
Male, non-tech
Female, non-tech
18
OS & App Permission Compliance
Comply with OS
0%
20%
% of participants
40%
60%
80%
100%
Overall
Tech
Non-tech
Comply with apps
More likely to comply with apps than OS?
Always agree
Always disagree
Find out more
Overall
Tech
Non-tech
19
Implications of Apple Ownership?
• Compared to Android owners, Apple users:
– Use devices more in public locations (up to 16%)
– Use their devices more for most social mobile
computing tasks
• Texting, e-mailing, and social networking (up to 63%)
– Have less regard for security
• WiFi - 86% of iPhone owners use open, public networks
without security, (6% above average)
• Less likely to use encryption (by 7%)
20
Survey Lessons
• Survey speaks to user attitudes towards
privacy, not necessarily actual behavior
• User attitudes critical in determining success
of a privacy or security measure
– As important to a privacy mechanism’s success as
the technical details of how it works?
• Important for developers of mobile and
pervasive privacy preserving mechanisms
21
Privacy Implications on Systems
• Users are far more concerned about protecting
their privacy from familiar people
– Parents twice the privacy threat as strangers?
• Perhaps privacy preserving mechanisms
designed to protect against family and friends?
• Researchers must ensure that their goals align
with users’ real privacy desires
22
Privacy, Trust, Anonymity
• Results suggest that trust and privacy are
largely orthogonal
– Those most trusted are also the most feared
• Perhaps perception of anonymity towards
strangers?
– False sense of security could face serious
consequences
23
On-going/Future Work
• Reported behavior = actual behavior?
• On-going long term usage study
– 35 selected users over three months
• Developed “Big Brother” Android firmware
– Tracks location, usage, histories, etc.
• Compare actual usage with user reported
changes
– Determine if users actually behave how they claim
24
Conclusion
• Users not concerned about preserving mobile
privacy?
– Even tech-savvy users do not alter their behavior based
on their surroundings
• Obvious critical question:
– Users unaware of the risks? Or
– Aware and simply do not care?
• If users don’t care about privacy, only the least
intrusive mechanisms will succeed
• Philosophically, is it even our business to care?
25
Thank you
Mobile Usage Patterns
and Privacy Implications
Michael Mitchell
mitchell@cs.fsu.edu
• All interaction with human subjects was approved by the Florida State
University IRB Human Subjects Committee, approval number 2013.10175.
• This work is sponsored by NSF CNS-1065127.
• Opinions, findings, and conclusions or recommendations expressed in this
document do not necessarily reflect the views of the NSF, FSU, UCLA, or
26
the U.S. government.
Download