Evaluating the Privacy Valuation of Personal Data on Smartphones

被引:0
|
作者
Fan, Lihua [1 ]
Zhang, Shuning [2 ]
Kong, Yan [2 ]
Yi, Xin [2 ,3 ]
Wang, Yang [4 ]
Xu, Xuhai ''Orson'' [5 ]
Yu, Chun [1 ]
Li, Hewu [3 ,6 ]
Shi, Yuanchun [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing, Peoples R China
[2] Tsinghua Univ, Inst Network Sci & Cyberspace, Beijing, Peoples R China
[3] Zhongguancun Lab, Beijing, Peoples R China
[4] Univ Illinois, Champaign, IL USA
[5] Univ Univ Washington, Informat Sch, Seattle, WA USA
[6] Tsinghua Univ, Beijing, Peoples R China
关键词
smartphone personal data; selling; auction; price model; privacy risk; context; monetary benefits;
D O I
10.1145/3678509
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smartphones hold a great variety of personal data during usage, which at the same time poses privacy risks. In this paper, we used the selling price to reflect users' privacy valuation of their personal data on smartphones. In a 7-day auction, they sold their data as commodities and earn money. We first designed a total of 49 commodities with 8 attributes, covering 14 common types of personal data on smartphones. Then, through a large-scale reverse second price auction (N=181), we examined students' valuation of 15 representative commodities. The average bid-price was 62.8 CNY (8.68 USD) and a regression model with 14 independent variables found the most influential factors for bid-price to be privacy risk, ethnic and gender. When validating our results on non-students (N=34), we found that despite they gave significantly higher prices (M=109.8 CNY, 15.17 USD), "privacy risk" was still one of the most influential factors among the 17 independent variables in the regression model. We recommended that stakeholders should provide 8 attributes of data when selling or managing it.
引用
收藏
页数:33
相关论文
共 50 条
  • [1] Unpacking privacy: Valuation of personal data protection
    Skatova, Anya
    McDonald, Rebecca
    Ma, Sinong
    Maple, Carsten
    [J]. PLOS ONE, 2023, 18 (05):
  • [2] Reengineering the user: privacy concerns about personal data on smartphones
    Tsavli, Matina
    Efraimidis, Pavlos S.
    Katos, Vasilios
    Mitrou, Lilian
    [J]. INFORMATION AND COMPUTER SECURITY, 2015, 23 (04) : 394 - 405
  • [3] PrivacyPalisade: Evaluating App Permissions and Building Privacy into Smartphones
    Quattrone, Anthony
    Kulik, Lars
    Tanin, Egemen
    Ramamohanarao, Kotagiri
    Gu, Tao
    [J]. 2015 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2015,
  • [4] Privacy evaluation: what empirical research on users' valuation of personal data tells us
    Morando, Federico
    Iemma, Raimondo
    Raiteri, Emilio
    [J]. INTERNET POLICY REVIEW, 2014, 3 (02):
  • [5] Personal Privacy Protection Framework Based on Hidden Technology for Smartphones
    Hong, Shuangxi
    Liu, Chuanchang
    Ren, Bingfei
    Huang, Yuze
    Chen, Junliang
    [J]. IEEE ACCESS, 2017, 5 : 6515 - 6526
  • [6] PRIVACY PROTECTION ON DATA OVERFLOW SYSTEM FOR SMARTPHONES
    Sindhusha, P.
    Bharathi, B.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTATION OF POWER, ENERGY INFORMATION AND COMMUNICATION (ICCPEIC), 2017, : 310 - 315
  • [7] Personal Data and Privacy in Movies
    Melotikova, Petra
    [J]. PRAVO V UMENI A UMENI V PRAVU, 2011, : 81 - 86
  • [8] Property, privacy, and personal data
    Schwartz, PM
    [J]. HARVARD LAW REVIEW, 2004, 117 (07) : 2055 - 2128
  • [9] PERSONAL DATA - RIGHT TO PRIVACY
    不详
    [J]. DATA PROCESSING, 1978, 20 (08): : 14 - &
  • [10] Who Moved My Data? Privacy Protection in Smartphones
    Dai, Wenyun
    Qiu, Meikang
    Qiu, Longfei
    Chen, Longbin
    Wu, Ana
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (01) : 20 - 25