Skip to main content

User Acceptance of Footfall Analytics with Aggregated and Anonymized Mobile Phone Data

  • Conference paper
Trust, Privacy, and Security in Digital Business (TrustBus 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8647))

Abstract

Monitoring and analyzing pedestrian traffic in and around retail stores has become an important tool for discovering underutilized operational and marketing opportunities of retail localities. Since a large proportion of pedestrians nowadays carry mobile phones, visual observation methods of the past could give way to cell-tower and WiFi based capture of passers-by, optionally augmented by aggregated or anonymized demographic data about them coming from their service providers. A major mobile phone operator recently announced the introduction of such a service in Germany, the U.K. and Brazil, but had to cancel its plans for Germany since the revelation caused nationwide privacy uproar.

We conducted an exploratory interview study to gauge whether and under what conditions German consumers would accept if their mobile phone providers disclosed their personal data to retail stores they walk by, in aggregated and anonymized individual form. Virtually all respondents wanted their data to remain private at an extent that goes considerably beyond the protections afforded by current privacy laws. Nearly everyone however also indicated an interest in financial incentives in return for their consent to the transfer of their data, and many of them at seemingly very reasonable terms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Nandakumar, R., Rallapalli, S., Chintalapudi, K., Padmanabhan, V.N., Qiu, L., Ganesan, A., Guha, S., Aggarwal, D., Goenka, A.: Physical Analytics: A New Frontier for (Indoor) Location Research. MSR-TR-2013-107, Microsoft Research, Banglore, India (2013)

    Google Scholar 

  2. Experian: People Counting Cameras (2014), http://www.footfall.com/people-counting

  3. Telefonica: Smart Steps (2013), http://dynamicinsights.telefonica.com/smart-steps

  4. Euclid: Euclid Analytics (2014), http://euclidanalytics.com/

  5. Ruckus: Location Services (2014), http://www.ruckussecurity.com/Location-Services.asp

  6. Little, J., O’Brien, B.: A Technical Review of Cisco’s Wi-Fi-Based Location Analytics (2013), http://www.cisco.com/c/en/us/products/collateral/wireless/mobility-services-engine/white_paper_c11-728970.pdf

  7. Biermann, K.: Überwachung: Telefonica will Handy-Bewegungsdaten an Werber verkaufen (2012), http://www.zeit.de/digital/datenschutz/2012-10/telefonica-smart-steps-vorratsdaten

  8. Roman, D.: Telefónica Goes a Little Bit “Big Brother” (2012), http://on.wsj.com/WJh6jb

  9. EU: Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data etc. (1995)

    Google Scholar 

  10. White House: Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Economy. Washington, D.C. (2012)

    Google Scholar 

  11. BDSB: German Federal Commissioner for Data Protection and Freedom of Information - Wiki, http://www.bfdi.bund.de/bfdi_wiki/

  12. Mascetti, S., Monreale, A., Ricci, A., Gerino, A.: Anonymity: A Comparison Between the Legal and Computer Science Perspectives. In: Gutwirth, S., Leenes, R., de Hert, P., Poullet, Y. (eds.) European Data Protection: Coming of Age, pp. 85–115. Springer (2013)

    Google Scholar 

  13. ICO: Anonymisation: managing data protection risk code of practice. Information Commissioner’s Office, Wilmslow, Cheshire, U.K. (2012)

    Google Scholar 

  14. EU: Proposal for a directive of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data etc. (2012)

    Google Scholar 

  15. Hall, R., Fienberg, S.E.: Privacy-Preserving Record Linkage. In: Domingo-Ferrer, J., Magkos, E. (eds.) PSD 2010. LNCS, vol. 6344, pp. 269–283. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  16. Verykios, V.S., Christen, P.: Privacy-preserving record linkage. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 3, 321–332 (2013)

    Google Scholar 

  17. BBC: Telefonica hopes “big data” arm will revive fortunes, http://www.bbc.co.uk/news/technology-19882647

  18. DE-FDPA: German Federal Data Protection Act, as of 1 September 2009 (1990)

    Google Scholar 

  19. DE-TCA: German Telecommunications Act, as of 7 August 2013 (2004)

    Google Scholar 

  20. Mantz, R.: Verwertung von Standortdaten und Bewegungsprofilen durch Telekommunikationsdiensteanbieter: Der Fall Telefónica/O2. Kommunikation und Recht. 7, 7–11 (2013)

    Google Scholar 

  21. Stage, C.W., Mattson, M.: Ethnographic interviewing as contextualized conversation. In: Clair, R.P. (ed.) Expressions of Ethnography, pp. 97–105. SUNY Press, Albany (2003)

    Google Scholar 

  22. Glaser, B.G.: Doing grounded theory: issues and discussions. Sociology Press (1998)

    Google Scholar 

  23. Kumaraguru, P., Cranor, L.F.: Privacy Indexes: A Survey of Westin’s Studies. Institute for Software Res. Intern’l, School of Comp. Sci. Carnegie Mellon Univ., Pittsburgh (2005)

    Google Scholar 

  24. Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967)

    Google Scholar 

  25. Posner, R.A.: The Right of Privacy. Georgia Law Review 12, 393–422 (1977)

    Google Scholar 

  26. Rule, J., Hunter, L.: Towards Property Rights in Personal Data. In: Grant, R.A., Bennett, C.J. (eds.) Visions of Privacy: Policy Choices for the Digital Age. Univ. Toronto Pr. (1999)

    Google Scholar 

  27. Laudon, K.C.: Markets and privacy. Communications of the ACM 39, 92–104 (1996)

    Article  Google Scholar 

  28. Schwartz, P.M.: Property, Privacy, and Personal Data. Harv. L. Rev. 117, 2056 (2003)

    Article  Google Scholar 

  29. Tsai, J.Y., Egelman, S., Cranor, L., Acquisti, A.: The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study. Info. Sys. Research. 22, 254–268 (2011)

    Article  Google Scholar 

  30. Jentzsch, N., Preibusch, S., Harasser, A.: Study on monetising privacy. An economic model for pricing personal information. Deliverable February 27, 2012, ENISA (2012)

    Google Scholar 

  31. Preibusch, S., Kübler, D., Beresford, A.R.: Price versus privacy: An experiment into the competitive advantage of collecting less personal information. Electron Com. Res. 13, 423–455 (2013)

    Article  Google Scholar 

  32. Beresford, A.R., Kübler, D., Preibusch, S.: Unwillingness to pay for privacy: A field experiment. Economics Letters 117, 25–27 (2012)

    Article  Google Scholar 

  33. Danezis, G., Lewis, S., Anderson, R.: How Much is Location Privacy Worth? In: Fourth Workshop on the Economics of Information Security, Cambridge, MA (2005)

    Google Scholar 

  34. Cvrcek, D., Kumpost, M., Matyas, V., Danezis, G.: A study on the value of location privacy. In: Proc. ACM WPES, pp. 109–118. ACM, Alexandria (2006)

    Google Scholar 

  35. Matyas, V., Kumpost, M.: Location Privacy Pricing and Motivation. In: 2007 International Conference on Mobile Data Management, pp. 263–267. Mannheim, Germany (2007)

    Google Scholar 

  36. Hann, I.-H., Hui, K.-L., Lee, T.S., Png, I.P.L.: Online Information Privacy: Measuring the Cost-Benefit Tradeoff. In: Proc. ICIS, Barcelona, Spain, pp. 1–10 (2002)

    Google Scholar 

  37. Huberman, B.A., Adar, E., Fine, L.A.: Valuating privacy. IEEE Sec. & Priv. 3, 22–25 (2005)

    Article  Google Scholar 

  38. Rose, J., Rehse, O., Röber, B.: The Value of our Digital Identity. Boston Cons. Gr. (2012)

    Google Scholar 

  39. Tversky, A., Kahneman, D.: Judgment under Uncertainty: Heuristics and Biases. Science 185, 1124–1131 (1974)

    Article  Google Scholar 

  40. EC: Attitudes on Data Protection and Electronic Identity in the European Union. Special Eurobarometer 359, European Commission, Brussels, Belgium (2011)

    Google Scholar 

  41. Pepitone, J.: What your wireless carrier knows about you - and what they’re selling (2013), http://money.cnn.com/2013/12/16/technology/mobile/wireless-carrier-sell-data/

  42. Troianovski, A.: Phone Firms Sell Data on Customers. WSJ. com (2013), http://online.wsj.com/news/articles/SB10001424127887323463704578497153556847658

  43. OECD: Exploring the Economics of Personal Data: A Survey of Methodologies for Measuring Monetary Value. Report 220, OECD, Paris (2013)

    Google Scholar 

  44. Norberg, P.A., Horne, D.R., Horne, D.A.: The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. Journal of Consumer Affairs 41, 100–126 (2007)

    Article  Google Scholar 

  45. Rivenbark, D.: Experimentally Elicited Beliefs Explain Privacy Behavior. Univ. of Central Florida, Dept. Economics (2011), http://EconPapers.repec.org/RePEc:cfl:wpaper:2010-09

  46. Preibusch, S.: Guide to measuring privacy concern: Review of survey and observational instruments. International Journal of Human-Computer Studies 71, 1133–1143 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Kobsa, A. (2014). User Acceptance of Footfall Analytics with Aggregated and Anonymized Mobile Phone Data. In: Eckert, C., Katsikas, S.K., Pernul, G. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2014. Lecture Notes in Computer Science, vol 8647. Springer, Cham. https://doi.org/10.1007/978-3-319-09770-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-09770-1_15

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-09769-5

  • Online ISBN: 978-3-319-09770-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics