45 research outputs found
Money Walks: A Human-Centric Study on the Economics of Personal Mobile Data
In the context of a myriad of mobile apps which collect personally
identifiable information (PII) and a prospective market place of personal data,
we investigate a user-centric monetary valuation of mobile PII. During a 6-week
long user study in a living lab deployment with 60 participants, we collected
their daily valuations of 4 categories of mobile PII (communication, e.g.
phonecalls made/received, applications, e.g. time spent on different apps,
location and media, photos taken) at three levels of complexity (individual
data points, aggregated statistics and processed, i.e. meaningful
interpretations of the data). In order to obtain honest valuations, we employ a
reverse second price auction mechanism. Our findings show that the most
sensitive and valued category of personal information is location. We report
statistically significant associations between actual mobile usage, personal
dispositions, and bidding behavior. Finally, we outline key implications for
the design of mobile services and future markets of personal data.Comment: 15 pages, 2 figures. To appear in ACM International Joint Conference
on Pervasive and Ubiquitous Computing (Ubicomp 2014
Presentation of self on a decentralised web
Self presentation is evolving; with digital technologies, with the Web and
personal publishing, and then with mainstream adoption of online social media.
Where are we going next? One possibility is towards a world where we log and
own vast amounts of data about ourselves. We choose to share - or not - the data
as part of our identity, and in interactions with others; it contributes to our day-to-day personhood or sense of self. I imagine a world where the individual is
empowered by their digital traces (not imprisoned), but this is a complex world.
This thesis examines the many factors at play when we present ourselves
through Web technologies. I optimistically look to a future where control over
our digital identities are not in the hands of centralised actors, but our own, and
both survey and contribute to the ongoing technical work which strives to make
this a reality. Decentralisation changes things in unexpected ways. In the
context of the bigger picture of our online selves, building on what we already
know about self-presentation from decades of Social Science research, I
examine what might change as we move towards decentralisation; how people
could be affected, and what the possibilities are for a positive change. Finally I
explore one possible way of self-presentation on a decentralised social Web
through lightweight controls which allow an audience to set their expectations
in order for the subject to meet them appropriately.
I seek to acknowledge the multifaceted, complicated, messy, socially-shaped
nature of the self in a way that makes sense to software developers. Technology
may always fall short when dealing with humanness, but the framework outlined
in this thesis can provide a foundation for more easily considering all of the
factors surrounding individual self-presentation in order to build future systems
which empower participants
Analysis of College Students’ Personal Health Information Activities: Online Survey
Background: With abundant personal health information at hand, individuals are faced with a critical challenge in evaluating the informational value of health care records to keep useful information and discard that which is determined useless. Young, healthy college students who were previously dependents of adult parents or caregivers are less likely to be concerned with disease management. Personal health information management (PHIM) is a special case of personal information management (PIM) that is associated with multiple interactions among varying stakeholders and systems. However, there has been limited evidence to understand informational or behavioral underpinning of the college students’ PHIM activities, which can influence their health in general throughout their lifetime.
Objective: This study aimed to investigate demographic and academic profiles of college students with relevance to PHIM activities. Next, we sought to construct major PHIM-related activity components and perceptions among college students. Finally, we sought to discover major factors predicting core PHIM activities among college students we sampled.
Methods: A Web survey was administered to collect responses about PHIM behaviors and perceptions among college students from the University of Kentucky from January through March 2017. A total of 1408 college students were included in the analysis. PHIM perceptions, demographics, and academic variations were used as independent variables to predict diverse PHIM activities using a principal component analysis (PCA) and hierarchical regression analyses (SPSS v.24, IBM Corp, Armonk, NY, USA).
Results: Majority of the participants were female (956/1408, 67.90%), and the age distribution of this population included an adequate representation of college students of all ages. The most preferred health information resources were family (612/1408, 43.47%), health care professionals (366/1408, 26.00%), friends (27/1408, 1.91%), and the internet (157/1408, 11.15%). Organizational or curatorial activities such as Arranging, Labeling, Categorizing, and Discarding were rated low (average=3.21, average=3.02, average=2.52, and average=2.42, respectively). The PCA results suggested 3 components from perception factors labeled as follows: Assistance (alpha=.85), Awareness (alpha=.716), and Difficulty (alpha=.558). Overall, the Demographics and Academics variables were not significant in predicting dependent variables such as Labeling, Categorizing, Health Education Materials, and Discarding, whereas they were significant for other outcome variables such as Sharing, Collecting, Knowing, Insurance Information, Using, and Owning.
Conclusions: College years are a significant time for students to learn decision-making skills for maintaining information, a key aspect of health records, as well as for educators to provide appropriate educational and decision aids in the environment of learning as independent adults. Our study will contribute to better understand knowledge about specific skills and perceptions for college students’ practice of effective PHIM throughout their lives
The Cognitive Ecology of the Internet
In this chapter, we analyze the relationships between the Internet
and its users in terms of situated cognition theory. We first argue that the Internet is a new kind of cognitive ecology, providing almost constant access to a vast amount of digital information that is increasingly more integrated into our cognitive routines. We then briefly introduce situated cognition theory
and its species of embedded, embodied, extended, distributed and collective
cognition. Having thus set the stage, we begin by taking an embedded
cognition view and analyze how the Internet aids certain cognitive tasks. After
that, we conceptualize how the Internet enables new kinds of embodied
interaction, extends certain aspects of our embodiment, and examine how
wearable technologies that monitor physiological, behavioral and contextual
states transform the embodied self. On the basis of the degree of cognitive
integration between a user and Internet resource, we then look at how and
when the Internet extends our cognitive processes. We end this chapter with
a discussion of distributed and collective cognition as facilitated by the Internet
Poster: an analysis of privacy features in 'expert-approved' kids' apps
During the course of the past decade, children have become avid consumers of digital media through mobile devices. The industry for children's mobile applications is booming and marketplaces offer categories of apps aimed specifically at children. In this study, we perform a mixed-methods privacy analysis of 137 'expert-approved' children's apps from the Google Play Store. Our findings show that these apps do not sufficiently support children to exercise their privacy rights, whilst simultaneously making use of libraries and data trackers which may collect and share sensitive user data
"Money makes the world go around": identifying barriers to better privacy in children’s apps from developers’ perspectives
The industry for children’s apps is thriving at the cost of children’s privacy: these apps routinely disclose children’s data to multiple data trackers and ad networks. As children spend increasing time online, such exposure accumulates to long-term privacy risks. In this paper, we used a mixed-methods approach to investigate why this is happening and how developers might change their practices. We base our analysis against 5 leading data protection frameworks that set out requirements and recommendations for data collection in children’s apps. To understand developers’ perspectives and constraints, we conducted 134 surveys and 20 semi-structured interviews with popular Android children’s app developers. Our analysis revealed that developers largely respect children’s best interests; however, they have to make compromises due to limited monetisation options, perceived harmlessness of certain third-party libraries, and lack of availability of design guidelines. We identified concrete approaches and directions for future research to help overcome these barriers
INNOVATIVE CENTRIFUGAL CONCENTRATOR BOWL FROM SEPRO MINERAL SYSTEMS
Modern centrifugal concentrators have become standard equipment for most precious metal extraction technologies due to their simplicity, cost-effectiveness and efficiency. However, as with any other technology, there is always room for improvement. Sepro Mineral Systems, Canada\u27s largest supplier of mineral processing equipment, has developed a new Frontier centrifugal concentrator bowl (patent pending), which will soon be installed on all Falcon gravity concentrators, and will also be able to serve as a replacement part for most Knelson concentrator models
Are iPhones really better for privacy? A comparative study of iOS and Android apps
While many studies have looked at privacy properties of the Android and Google Play app ecosystem, comparatively much less is known about iOS and the Apple App Store, the most widely used ecosystem in the US. At the same time, there is increasing competition around privacy between these smartphone operating system providers. In this paper, we present a study of 24k Android and iOS apps from 2020 along several dimensions relating to user privacy. We find that third-party tracking and the sharing of unique user identifiers was widespread in apps from both ecosystems, even in apps aimed at children. In the children’s category, iOS apps tended to use fewer advertising-related tracking than their Android counterparts, but could more often access children’s location. Across all studied apps, our study highlights widespread potential violations of US, EU and UK privacy law, including 1) the use of third-party tracking without user consent, 2) the lack of parental consent before sharing personally identifiable information (PII) with third-parties in children’s apps, 3) the non-data-minimising configuration of tracking libraries, 4) the sending of personal data to countries without an adequate level of data protection, and 5) the continued absence of transparency around tracking, partly due to design decisions by Apple and Google. Overall, we find that neither platform is clearly better than the other for privacy across the dimensions we studied
Goodbye tracking? Impact of iOS app tracking transparency and privacy labels
Tracking is a highly privacy-invasive data collection practice that has been ubiquitous in mobile apps for many years due to its role in supporting advertising-based revenue models. In defence of user privacy, Apple introduced two significant changes with iOS 14: App Tracking Transparency (ATT), a mandatory opt-in system for enabling tracking on iOS, and Privacy Nutrition Labels, which disclose what kinds of data each app processes. So far, the impact of these changes on individual privacy and control has not been well understood. This paper addresses this gap by analysing two versions of 1,759 iOS apps from the UK App Store: one version from before iOS 14 and one that has been updated to comply with the new rules. We find that Apple’s new policies, as promised, prevent the collection of the Identifier for Advertisers (IDFA), an identifier used to facilitate cross-app user tracking. Smaller data brokers, who used to engage in some of the most invasive data practices, will now face higher challenges in tracking users – a positive development for privacy. However, the number of tracking libraries has – on average – roughly stayed the same in the studied apps. Many apps still collect device information that can be used to track users at a group level (cohort tracking) or identify individuals probabilistically (fingerprinting). We find real-world evidence of apps computing and agreeing on a fingerprinting-derived identifier through the use of server-side code, thereby violating Apple’s policies and exposing the limits of what ATT can do against tracking on iOS. This is especially concerning because we explicitly refused opt-in to tracking in our study, and consent is a legal requirement for tracking under EU and UK data protection law. We find that Apple itself engages in some forms of tracking and exempts invasive data practices like first-party tracking and credit scoring from its new rules, and that the new Privacy Nutrition Labels were often inaccurate. This is in conflict with the company’s marketing claims and the resulting expectations of many iOS users. Overall, our observations suggest that, while Apple’s changes make tracking individual users more difficult, they motivate a counter-movement, and reinforce existing market power of gatekeeper companies with access to large troves of first-party data. Making the privacy properties of apps transparent through large-scale analysis remains a difficult target for independent researchers, and a key obstacle to meaningful, accountable and verifiable privacy protections