Privacy perception in location-based services for mobile devices in the university community of the north coast of Colombia
HTML Full Text
PDF
XML

Keywords

Location privacy
Privacy perception
Location-Based Services

How to Cite

Privacy perception in location-based services for mobile devices in the university community of the north coast of Colombia. (2019). Ingenieria Y Universidad, 23(1). https://doi.org/10.11144/Javeriana.iyu23-1.pplb
Almetrics
 
Dimensions
 

Google Scholar
 
Search GoogleScholar

Abstract

Introduction: The use of mobile applications has increased in the last years. Most of them require the knowledge of the user location, either for their core service or for marketing purposes. Location-based services (LBS) offer context-based assistance to users based on their location. Although these applications ask the user for permission to use their location and even explain in detail how this information will be used in its terms and conditions, most users are not aware or even interested in the fact that their location information is stored in databases and monetized by selling it to third-party companies. Regarding this situation, we developed a study with the aim to assess perception, concerns and awareness from users about their location information. Methods: This work is based on an exploratory survey applied to the university community, mainly from the North Coast of Colombia, to measure the perception of location privacy of users with mobile devices. The questionnaire was applied using Google Forms. The survey has nineteen questions organized in three sections: personal information, identification of privacy and privacy management. These questions were designed to know the users’ perceptions of privacy concerns in LBS and any actions they take to preserve it. Results: The results show that, in general, the respondents do not have a real concern regarding the privacy of their geolocation data, and the majority is not willing to pay to protect their privacy. Conclusions: This type of surveys can generate awareness among participants about the use of their private information. The results expose in this paper can be used to create government policies and regulations by technology companies about the privacy management.

HTML Full Text
PDF
XML

[1] M. Madden, “Public perceptions of privacy and security in the post-Snowden Era,” Pew Research Center, 2014. [Online]. Available: https://pewrsr.ch/2JVAjQK
[2] P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, “Preventing location-based identity inference in anonymous spatial queries,” IEEE Trans. Knowl. Data Eng., vol. 19, no. 12, pp. 1719–1733, Dec. 2007. doi: 10.1109/TKDE.2007.190662
[3] M. Zurbaran, L. Gonzalez, P. Wightman Rojas, and M. Labrador, “A survey on privacy in location-based services,” Ing. Desarr., vol. 32, no. 2, pp. 314–343, 2014. Available: http://bit.ly/2ENeA9i
[4] J. K. Burgoon, R. Parrott, B. A. Le Poire, D. L. Kelley, J. B. Walther, and D. Perry, “Maintaining and restoring privacy through communication in different types of relationships,” J. Soc. Pers. Relat., vol. 6, no. 2, pp. 131–158, May 1989. https://doi.org/10.1177/026540758900600201
[5] A. F. Westin, “Washington and Lee Law Review Privacy and Freedom,” Lee L. Rev., vol. 166, no. 1, 1968. Available: http://bit.ly/2HU9dak
[6] L. Steinfeld and K. Sutherland Archuleta, “Privacy protection and compliance in higher education: The role of the CPO,” EDUCAUSE Rev., vol. 41, no. 5, pp. 62–71, Sept./Oct. 2006. Available: http://bit.ly/2Zb1J8R
[7] UN High Commissioner for Human Rights, “The right to privacy in the digital age,” Human Rights Council 27th Session, Jun. 30 2014. Available: http://bit.ly/2IfAZgl
[8] C. Paine, U.-D. Reips, S. Stieger, A. Joinson, and T. Buchanan, “Internet users’ perceptions of ‘privacy concerns’ and ‘privacy actions,’” Int. J. Hum. Comput. Stud., vol. 65, no. 6, pp. 526– 536, 2007. https://doi.org/10.1016/j.ijhcs.2006.12.001
[9] EFF, “The problem with mobile phones,” Surveillance Self-Defense - EFF, 2015. [Online]. Accessed on: Aug. 06 2018. Available: http://bit.ly/2wyrnrP
[10] Y.-A. de Montjoye and C. A. Hidalgo, “Unique in the crowd: The privacy bounds of human mobility,” Sci. Rep., vol. 3, pp. 193–220, Mar. 2013. Available: https://go.nature.com/2Wimanf
[11] R. Mekovec and N. Vrþek, “Factors that influence internet users’ privacy perception,” in 33rd Int. Conf. Inf. Technol. Interfaces, Cavtat, Croatia, Jun. 2011, pp. 27–30. Available: http://bit.ly/2WGXc0a
[12] J. L. Boyles, A. Smith, and M. Madden, “Privacy and data management on mobile devices,” Pew Research Center [Online]. Available: https://pewrsr.ch/2HRxrln
[13] I. Boutsis and V. Kalogeraki, “A fast and efficient entity resolution approach for preserving privacy in mobile data,” in 2016 IEEE Int. Congr. Big Data, BigData Congr., pp. 173–180. doi: 10.1109/BigDataCongress.2016.29
[14] L. Tang, S. Vrbsky, and X. Hong, “Collaborated camouflaging mobility for mobile privacy,” in IEEE GLOBECOM 2008, pp. 2154–2158. doi: 10.1109/GLOCOM.2008.ECP.415
[15] R. Liu, J. Cao, L. Yang, and K. Zhang, “PriWe: Recommendation for privacy settings of mobile apps based on crowdsourced users’ expectations,” in 2015 IEEE Int. Conf. Mobile Services, pp.150–157. doi: 10.1109/MobServ.2015.30
[16] Y. Gong, L. Wei, Y. Guo, C. Zhang, and Y. Fang, “Optimal task recommendation for mobile crowdsourcing with privacy control,” in IEEE Internet Things J., vol. 3, no. 5, pp. 745–756, Oct. 2016. doi: 10.1109/JIOT.2015.2512282
[17] G. Font, J. Bustos, S. Blasco, and A. Hevia, “Location privacy for a monitoring system of the quality of access to mobile internet,” in IEEE Lat. Am. Trans., vol. 14, no. 6, pp. 2894–2896, Jun. 2016. doi: 10.1109/CNS.2014.6997533
[18] M. Poikela, R. Schmidt, I. Wechsung, and S. Moller, “About your smartphone usage: Privacy in location-based mobile participation,” in 2015 IEEE Int. Symp. Technol. Soc., ISTAS, pp. 1–6. doi: 10.1109/ISTAS.2015.7439421
[19] Instituto Nacional de Tecnologías de la Comunicación, INTECO, “Estudio sobre seguridad en dispositivos móviles y smartphones,” Observ. Seguridad Inform., 2011. Available: http://bit.ly/2JTWJSk
[20] D. Wagner et al., “Hide and seek,” in Proc. 12th Int. Conf. Human Comput. Interaction Mobile Devices Serv. - MobileHCI ’10, 2010, pp. 55–58.
[21] GSMA, “Mobile privacy: Consumer research insights and considerations for policymakers,” 2014. Available: http://bit.ly/2Xn2oUb
[22] A. Fink, J. Kosecoff, M. Chassin, and R. H. Brook, “Consensus methods: Characteristics and guidelines for use,” Am. J. Public Health, vol. 74, no. 9, pp. 979–83, Sep. 1984.
[23] J. Casas Anguita, J. R. Repullo Labrador, and J. Donado Campos, “La encuesta como técnica de investigación. Elaboración de cuestionarios y tratamiento estadístico de los datos (I),” Aten. Primaria, vol. 31, no. 8, pp. 469–558, 2003. https://doi.org/10.1016/S0212-6567(03)70728-8
[24] D. Christin, C. Buchner, and N. Leibecke, “What’s the value of your privacy? Exploring factors that influence privacy-sensitive contributions to participatory sensing applications,” in 38th Ann. IEEE Conf. Local Comput. Netw.-Workshops, 2013, pp. 918–923. doi: 10.1109/LCNW.2013.6758532
[25] A. J. B. Brush, J. Krumm, and J. Scott, “Exploring end user preferences for location obfuscation, location-based services, and the value of location,” in Proc. 12th ACM Int. Conf. Ubiquitous Comput., 2010, pp. 95–104. Available: http://bit.ly/2KpDyzl
[26] M. Arriaza Balmón, Guía práctica de análisis de datos. S. l.: Instituto de Investigación y Formación Agraria y Pesquera, 2006. Available: http://bit.ly/2JYnyEW
[27] L. Galvis, “Geografía económica del Caribe continental,” Doc. Trabajo Econom. Regional, no. 119, 2009.
[28] U.-D. Reips, “Standards for internet-based experimenting,” Exp. Psychol., vol. 49, no. 4, pp. 243–256, 2002. Available: http://bit.ly/2Xk7e4m

This journal is registered under a Creative Commons Attribution 4.0 International Public License. Thus, this work may be reproduced, distributed, and publicly shared in digital format, as long as the names of the authors and Pontificia Universidad Javeriana are acknowledged. Others are allowed to quote, adapt, transform, auto-archive, republish, and create based on this material, for any purpose (even commercial ones), provided the authorship is duly acknowledged, a link to the original work is provided, and it is specified if changes have been made. Pontificia Universidad Javeriana does not hold the rights of published works and the authors are solely responsible for the contents of their works; they keep the moral, intellectual, privacy, and publicity rights.

Approving the intervention of the work (review, copy-editing, translation, layout) and the following outreach, are granted through an use license and not through an assignment of rights. This means the journal and Pontificia Universidad Javeriana cannot be held responsible for any ethical malpractice by the authors. As a consequence of the protection granted by the use license, the journal is not required to publish recantations or modify information already published, unless the errata stems from the editorial management process. Publishing contents in this journal does not generate royalties for contributors.