Jump to ContentJump to Main Navigation
Show Summary Details
More options …

Proceedings on Privacy Enhancing Technologies

4 Issues per year

Open Access
See all formats and pricing
More options …

Crowdsourcing for Context: Regarding Privacy in Beacon Encounters via Contextual Integrity

Emmanuel Bello-Ogunu / Mohamed Shehab
Published Online: 2016-05-06 | DOI: https://doi.org/10.1515/popets-2016-0017


Research shows that context is important to the privacy perceptions associated with technology. With Bluetooth Low Energy beacons, one of the latest technologies for providing proximity and indoor tracking, the current identifiers that characterize a beacon are not sufficient for ordinary users to make informed privacy decisions about the location information that could be shared. One solution would be to have standardized category and privacy labels, produced by beacon providers or an independent third-party. An alternative solution is to find an approach driven by users, for users. In this paper, we propose a novel crowdsourcing based approach to introduce elements of context in beacon encounters.We demonstrate the effectiveness of this approach through a user study, where participants use a crowd-based mobile app designed to collect beacon category and privacy information as a scavenger hunt game. Results show that our approach was effective in helping users label beacons according to the specific context of a given beacon encounter, as well as the privacy perceptions associated with it. This labeling was done with an accuracy of 92%, and with an acceptance rate of 82% of all recommended crowd labels. Lastly, we conclusively show how crowdsourcing for context can be used towards a user-centric framework for privacy management during beacon encounters.

Keywords: Internet of things; Bluetooth low energy; beacons; location privacy; crowdsourcing


  • [1] Helen Nissenbaum. Privacy as contextual integrity. Washington law review, 79(1), 2004.Google Scholar

  • [2] Galen Grumen. What you need to know about using bluetooth beacons, 2014. http://www.infoworld.com/article/2608498/mobile-apps/what-you-need-to-know-about-usingbluetooth-beacons.html.Google Scholar

  • [3] Cathy Goodwin. A conceptualization of motives to seek privacy for nondeviant consumption. Journal of Consumer Psychology, 1(3):261-284, 1992.CrossrefGoogle Scholar

  • [4] Bluetooth SIG. Bluetooth smart technology: Powering the internet of things, 2015. http://www.bluetooth.com/Pages/Bluetooth-Smart.aspx.Google Scholar

  • [5] Bluetooth SIG. Welcome to bluetooth technology 101, 2015. http://www.bluetooth.com/Pages/Fast-Facts.aspx.Google Scholar

  • [6] Bluetooth SIG. Are ibeacons cookies for the physical web?, 2015. http://www.bluetooth.com/Pages/Consumer-Electronics-Market.aspx.Google Scholar

  • [7] Jeff Howe. The rise of crowdsourcing. Wired magazine, 14(6):1-4, 2006.Google Scholar

  • [8] Jakob Voss. Measuring wikipedia. 2005.Google Scholar

  • [9] Michael Buhrmester, Tracy Kwang, and Samuel D Gosling. Amazon’s mechanical turk a new source of inexpensive, yet high-quality, data? Perspectives on psychological science, 6(1):3-5, 2011.Google Scholar

  • [10] David P Anderson, Jeff Cobb, Eric Korpela, Matt Lebofsky, and Dan Werthimer. Seti@ home: an experiment in public-resource computing. Communications of the ACM, 45(11):56-61, 2002.Google Scholar

  • [11] Daren C Brabham. Moving the crowd at threadless: Motivations for participation in a crowdsourcing application. Information, Communication & Society, 13(8):1122-1145, 2010.Web of ScienceGoogle Scholar

  • [12] Thomas W Malone, Robert Laubacher, and Chrysanthos Dellarocas. The collective intelligence genome. IEEE Engineering Management Review, 38(3):38, 2010.CrossrefGoogle Scholar

  • [13] Jialiu Lin Bin Liu Norman Sadeh and Jason I Hong. Modeling users’ mobile app privacy preferences: Restoring usability in a sea of permission settings. In Symposium on Usable Privacy and Security (SOUPS), 2014.Google Scholar

  • [14] Bin Liu, Jialiu Lin, and Norman Sadeh. Reconciling mobile app privacy and usability on smartphones: could user privacy profiles help? In Proceedings of the 23rd international conference on World wide web, pages 201-212. ACM, 2014.Google Scholar

  • [15] Jialiu Lin, Guang Xiang, Jason I. Hong, and Norman Sadeh. Modeling people’s place naming preferences in location sharing. In Proceedings of the 12th ACM International Conference on Ubiquitous Computing, UbiComp ’10, pages 75-84, New York, NY, USA, 2010. ACM.Google Scholar

  • [16] Norman Sadeh, Alessandro Acquisti, Travis D Breaux, Lorrie Faith Cranor, Aleecia M McDonalda, Joel R Reidenbergb, Noah A Smith, Fei Liu, N Cameron Russellb, Florian Schaub, et al. The usable privacy policy project. Technical report, Tech. report CMU-ISR-13-119, Carnegie Mellon University, 2013.Google Scholar

  • [17] Iker Burguera, Urko Zurutuza, and Simin Nadjm-Tehrani. Crowdroid: behavior-based malware detection system for android. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, pages 15-26. ACM, 2011.Google Scholar

  • [18] Jialiu Lin, Shahriyar Amini, Jason I Hong, Norman Sadeh, Janne Lindqvist, and Joy Zhang. Expectation and purpose: understanding users’ mental models of mobile app privacy through crowdsourcing. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing, pages 501-510. ACM, 2012.Google Scholar

  • [19] Yuvraj Agarwal and Malcolm Hall. Protectmyprivacy: detecting and mitigating privacy leaks on ios devices using crowdsourcing. In Proceeding of the 11th annual international conference on Mobile systems, applications, and services, pages 97-110. ACM, 2013.Google Scholar

  • [20] Estimote. Estimote beacons, 2015. http://estimote.com/.Google Scholar

  • [21] Luis Von Ahn. Games with a purpose. Computer, 39(6):92-94, 2006.Google Scholar

About the article

Received: 2015-11-30

Revised: 2016-03-01

Accepted: 2016-03-02

Published Online: 2016-05-06

Published in Print: 2016-07-01

Citation Information: Proceedings on Privacy Enhancing Technologies, ISSN (Online) 2299-0984, DOI: https://doi.org/10.1515/popets-2016-0017.

Export Citation

© 2016. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. BY-NC-ND 4.0

Citing Articles

Here you can find all Crossref-listed publications in which this article is cited. If you would like to receive automatic email messages as soon as this article is cited in other publications, simply activate the “Citation Alert” on the top of this page.

Gonzalo Cerruela García, Irene Luque Ruiz, and Miguel Gómez-Nieto
Sensors, 2016, Volume 16, Number 11, Page 1968

Comments (0)

Please log in or register to comment.
Log in