Measuring snooping behavior with surveys
2014, Proceedings of the extended abstracts of the 32nd annual ACM conference on Human factors in computing systems - CHI EA '14
https://doi.org/10.1145/2559206.2581240Abstract
In close relationships, snooping through another's mobile device is commonly regarded as an invasion of privacy. The prevalence of such behavior is, however, difficult to assess. Here we compare two in-person survey techniques, one in which the question about snooping behavior is posed directly, and one in which strong anonymity controls are employed. Results (n=90) reveal that, while in the first case 10% of respondents admitted to snooping, in the second the estimate was 60%. This shows that, although there is a potent social desirability bias at play, strong anonymity controls do improve estimates. Furthermore, it suggests an alarming prevalence of snooping behavior among the target population.
References (10)
- Acquisti, A. Nudging Privacy: The Behavioral Economics of Personal Information. IEEE Security & Privacy Magazine 7, 6 (2009), 82-85.
- Ben-Asher, N. et al. On the need for different security methods on mobile phones. In Proc. MobileHCI '11, ACM Press (2011), 465-473.
- Clarke, N. L., Furnell, S. M. Authentication of users on mobile telephones -A survey of attitudes and practices. Computers & Security 24, 7 (2005), 519- 527.
- Coutts, E., Jann, B. Sensitive Questions in Online Surveys: Experimental Results for the Randomized Response Technique (RRT) and the Unmatched Count Technique (UCT). Sociological Methods & Research 40, 1 (2011), 169-93.
- Felt, A. P., Egelman, S., Wagner, D. I've got 99 problems, but vibration ain't one: A Survey of Smartphone Users' Concerns. In Proc. SPSM '12, ACM Press (2012), 33-44.
- Johnson, M., Egelman, S., Bellovin, S. M. Facebook and privacy: it's complicated. In Proc. SOUPS '12, ACM Press (2012), 1-15.
- McNeeley, S. Sensitive Issues in Surveys: Reducing Refusals While Increasing Reliability and Quality of Responses to Sensitive Survey Items. Handbook of Survey Methodology for the Social Sciences, Springer (2012), 377-396.
- Muslukhov, I. et al. Know your enemy: the risk of unauthorized access in smartphones by insiders. In Proc. MobileHCI '13, ACM Press (2013), 271-280.
- Raghavarao, D., Federer, W. T. Block Total Response as an Alternative to the Randomized Response Method in Surveys. J. Royal Statistical Society Ser. B 41, 1 (1979), 40-45.
- Tourangeau, R., Yan, T. Sensitive questions in surveys. Psychological bulletin 133, 5 (2007), 859-88