You are currently viewing a new version of our website. To view the old version click .
Applied Sciences
  • Article
  • Open Access

14 December 2023

A Study on Exploring the Level of Awareness of Privacy Concerns and Risks

,
,
and
1
School of Computing and Data Science, Wentworth Institute of Technology, Boston, MA 02115, USA
2
College of Computing and Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Advanced Technologies in Data and Information Security III

Abstract

With the recent increase in phishing attacks and other kinds of malicious activities, increasing the awareness of security and privacy awareness is arguably one of the best proven ways of preventing these kinds of threats. The main challenge in security and privacy awareness is the end user’s awareness of aspects of privacy and security they give up when using the Internet. Thus, this study focuses on identifying and discussing the growing threats of Internet usage and the lack of privacy and security knowledge of the everyday person. This study presents the results of a survey conducted to determine discrepancies between what rights users think they sign away when they agree to terms of service versus what rights they actually give away. It is hypothesized that people are genuinely unaware of what rights they are giving up, especially since they are signing the terms of service without reading the fine print. In this study, the terms of service were presented to respondents, and they answered questions on what they thought they were giving up, but once they answered the questions, they were explicitly told whether they truly knew what rights they signed away. The experimental results of this study examine how much knowledge the everyday person lacks with respect to the privacy policies they sign. All of this is ultimately used to examine possible flaws in the system. The experimental results illustrate the results of the survey. Based on the total surveys completed, the average score was 62%. This means that out of 10 clauses described in a given terms of service document or privacy policy, people are truly unaware of at least 4 of these statements.

1. Introduction

The introduction of the Internet opened numerous opportunities for the development of applications that have made life easier. From worldwide communications to video streaming platforms, the Internet has made life convenient [1]. However, with this convenience comes a cost. Malicious activities such as phishing attacks have become commonplace. Not only has data theft become more commonplace, but the act of stealing data has never been easier. As a result of convenience being the number one priority for many corporations, user data are practically open to the public. From work history to important events in life, sites such as LinkedIn, Facebook, and Twitter allow users to post as much of their information as they can. Furthermore, social media companies typically collect cookie data and other information on who you are [2]. The data collected are often sold to third parties. However, what if those data were leaked to the public? There have been numerous instances where sensitive data were unintentionally leaked [3]. In addition to these potential issues, some other factors such as phishing attacks, unclear privacy settings, and searchable databases may contribute to the increased risk in modern social media platforms.
With the availability of technology, it has become increasingly apparent that phishing schemes are no longer difficult to perform. A form of phishing scheme is where a malicious user sends a link to an individual, where they are asked to either download a fake program or give away sensitive information [4]. On platforms that rely on peer-to-peer messaging, which is especially dangerous as phishing perpetrators are able to target individuals who are most vulnerable to falling for phishing schemes.
The increased usage of social media platforms has made it crucial that users update their profile settings to allow only their intended targets to see their posts. However, it has become clear that social media platforms are not explicit in defining the privacy settings of a user, leading to serious mismatching issues with regard to user expectations of their privacy in relation to the settings they have applied and the reality of their privacy settings [5].
Many corporations use searchable databases as a means of knowing prior purchase history in order to advertise similar products to users. This means that corporations are aware of customers’ purchase history, ensuring that whatever decision they make is not guaranteed to be known to them alone. By hacking, it means that records relating to an individual may be revealed. This is especially dangerous considering that police use similar technology to predict areas of crime [6]. Despite the numerous risks that are present today, many are still unaware of these risks and the consequences of insufficient privacy/security measures [7]. Although IoT devices bring tremendous benefits in terms of user experience, they impose significant privacy risks [8].
In turn, the purpose of this research is to explain why many people still lack fundamental knowledge of privacy/security risks, to explain why many people still choose not to implement security/privacy measures after learning about the risks, and to give some potential solutions for this problem. The purpose of this empirical study is to explore the level of awareness of how much privacy one gives up on social media platforms. The research method targets the fine-print agreements of social media. To the best of our knowledge, no such study exists in exploring the level of awareness on how much privacy one gives up based on understanding these fine-print agreements. Undoubtedly, there are several state-of-the-art studies on privacy concerns in the data analysis of social networks, including [9], in which the researchers collected data concerning users who have different social network profiles in order to analyze privacy options provided by social media platforms.

3. Methodology

To educate internet users about the importance of internet security, an application was developed. The application was designed to give users first-hand experience with an attack and illustrate why that attack could be dangerous. The process for developing the educational application is illustrated in Figure 1.
Figure 1. Proof-of-concept development process.

3.1. Proof of Concept WPF Application

The proof-of-concept application is designed using WPF (Windows Presentation Foundation) and consists of three main components: a simulated Citizens Bank login page for the phishing scam, a post-phishing scam explanation page, and a privacy education page.
Upon entering their credentials and clicking "LOG IN", users are redirected to a page that elaborates on the potential risks associated with their actions. This page serves to emphasize the ease with which phishing perpetrators can acquire sensitive information from unsuspecting victims. Importantly, the entered credentials are not stored in any database; their sole purpose is to highlight the dangers of falling for phishing scams.
Furthermore, the application incorporates an additional page dedicated to educating users about the perils of phishing. This page presents users with questions related to social media privacy policies, and their responses are evaluated against the corresponding quotes from the respective privacy policies. The feedback provided alongside each question reinforces the validity of the user’s answer.
Figure 2, Figure 3 and Figure 4 illustrate the user interface of our prototype.
Figure 2. An outline of the survey setup.
Figure 3. An example of the prototype for each survey and its questions.
Figure 4. User enters name and picks social media sites they use.

3.2. React App Implementation

For the actual implementation, the application was developed using the MERN stack (MongoDB database, Express.js server, React.js front-end, Node.js runtime). This was an advantageous choice of implementation for several reasons. One reason is that using a web application allows for a responsive cross-platform design. While much of the application remains in the prototype stage, a cloud-hosted web application would be the most suitable option for widespread deployment. This approach would ensure accessibility across various devices, including mobile platforms. The suitability of a web application is further reinforced by the effectiveness of webpage data representation (DOM, HTML, and CSS) in crafting responsive and interactive surveys that dynamically adapt their content to present educational information upon completion [20].
The structure for the React app is essentially the same as the WPF application, but with additional features such as a reporting page, a server to process and generate data using RESTful API, and a database to persistently store data for each participant based on the surveys that they completed. The application diverged from its prototype, ultimately settling on mimicking Leopard Web [21] instead of Citizens Bank. The Leopard Web copy was meticulously crafted to closely resemble the actual site while incorporating subtle modifications to ascertain users’ ability to distinguish between the fake and genuine Leopard Web. The replica website omitted certain elements, such as the copyright trademark at the bottom and the black bar at the top featuring the Wentworth logo. Upon entering their credentials, users are directed to a screen that elucidates the dangers of phishing scams. A button is provided to seamlessly transition to the subsequent survey. Once they have reached the survey, they will see a screen that requires them to enter their name and select which platforms they use (YouTube, Twitter, Pinterest, etc.). Figure 4 displays this screen. Once they select the platforms that they want to take surveys on, they will be asked a series of true or false questions that are based on the Terms of Service and Privacy Policies for each platform. Samples of these questions are given in Figure 5 and Table 1. The users are expected to answer to the best of their ability. When the users complete the surveys, they will press the “Submit Surveys” button. Upon clicking the button and submitting their response, the survey cards will flip to reveal the backside. On the back of each card, participants will find their score displayed prominently in the top left corner. The backsides also replicate the statements from the front, with incorrect answers highlighted in red for easy identification. Aligned with the educational objectives of the application, participants were allowed to click on underlined (invalid) statements to access additional information that elaborated on the specific statement. For instance, if a user clicks on a statement they incorrectly guessed as false, a dialog box will emerge, revealing the statement’s veracity. This dialog box will additionally provide a supporting quote directly from the applicable privacy policy or terms of service. These efforts are driven by the overarching goal of maximizing the educational value and transparency for participants, aiming to illuminate aspects of privacy policies and terms of service that they may not have been aware of. This approach will ultimately contribute to addressing the fundamental question of the public’s understanding of privacy concerns and risks. Figure 5 and Figure 6 show the steps of the application.
Figure 5. User answers questions for each site they use. Please note that the image does not display the full Q&A, as some questions for the Amazon section are cut out in order to fit into the paper.
Table 1. Table containing all sites, with questions from each site, and the specific source of the question.
Figure 6. Average accuracy of participants in determining the privacy policies of different corporations.
Once a survey is completed, average scores for each site is computed using the following formula:
x i n
where xi represents the score for a given survey of a site and n represents the total number of individuals who took the survey for this particular site. A similar formula is applied to the global average:
a i n t o t a l
The equation presented above deviates from the initial equation in that it divides the sum of the participants’ average scores across all surveys by the total number of surveys taken, rather than simply summing the scores. This modification reflects a shift in focus from individual survey scores to the overall average performance across multiple surveys.

4. Results

A total of 100 individuals participated in the survey, most of whom were college students or recent graduates. The participants completed surveys for each platform that they use. Figure 6 illustrates the results of the survey. Based on the total surveys completed, the average score was 62%. The findings reveal that, on average, individuals are genuinely unaware of at least 4 out of the 10 clauses outlined in each Terms of Service or Privacy Policy. Furthermore, interviewers seem to have performed the poorest when evaluating TikTok, with an average score of only 40%. Despite the recent controversies relating to TikTok, surprisingly, many individuals are still unaware of the privacy risks associated with the platform. Facebook, which has had years of privacy and legal problems, is the second worst-performing survey. Analyzing the collected data revealed several potential inferences, such as the possibility that users of these platforms are not thoroughly reading the Terms of Service and Privacy Policies or that the platforms themselves are not clearly disclosing the extent of the data being collected from users. Both factors could contribute to a lack of user awareness regarding data collection practices, potentially undermining trust in these platforms.
Table 1 presents an overview of the survey questions employed to gauge public understanding, along with the corresponding websites the questions refer to and the specific sources from which they were drawn.

5. Discussion

Among the eight companies, Amazon, the e-commerce giant, achieved the second-highest score. As a company that focuses on shopping convenience [42], numerous privacy rights are given up when signing onto the platform. Information such as addresses and credit card details is essential for Amazon to fulfill orders and process payments. These details enable the company to deliver purchased products to users’ residences and securely collect payments for transactions. Amazon’s high survey accuracy suggests that participants are well-informed about the data they share with the platform. Despite the length and complexity of privacy policies on e-commerce platforms like Amazon, their reputation as reliable product sellers and shippers implicitly conveys the need to collect certain user information [43]. Consequently, a company’s reputation can serve as an intermediary between itself and its users, enabling users to glean some understanding of the platform’s privacy practices and the types of data required for service utilization.
LinkedIn, a professional networking platform designed to connect individuals with potential employers, harbors a multitude of potential data theft risks [44]. The wealth of sensitive information stored on the platform, including educational background and employment history, makes it a prime target for malicious actors seeking to exploit these valuable data. These types of information could be used to fabricate identity and lead to account vulnerabilities (school information may be used in security questions for certain platform accounts). Although LinkedIn has not had any recent privacy controversies associated with their platform, there is potential for hacking/data theft to occur because of open information being available to everyone who has a LinkedIn account. Unlike Amazon, the average accuracy of the survey conducted for LinkedIn was 55%, implying that some participants were unfamiliar with specific privacy policies related to LinkedIn.

6. Conclusions

In summary, the development and expansion of the Internet have brought both convenience and risks. These risks harbor the potential for devastating identity theft or data breaches, exposing end users to severe consequences. Despite these risks, many are either unaware or unconcerned. The reasoning behind an individual’s unawareness is more than just a lack of knowledge, but also a lack of personal or second-hand experience. To address these concerns, an educational application was developed that provides users with both hands-on experience in identifying phishing scams and comprehensive knowledge of various privacy policies. This study delves into the extent to which end users are aware of the privacy and security implications associated with their online activities. Based on the experiment results, the average score was 62%. This means that out of 10 clauses described in each Terms of Service or Privacy Policy, people are truly unaware of at least 4 of these statements. The lack of comprehensive understanding among users about the data they relinquish when interacting online hinders their ability to effectively assess the risks associated with information sharing. Terms of Service and Privacy Policies can be hundreds of pages long and, due to time constraints, it is difficult to assume that people will read them everyday and retain any of the information. In future research, we plan to investigate strategies for enhancing the effectiveness and usability of the terms of use and privacy policies, empowering users with a comprehensive understanding of their privacy rights.

Author Contributions

Implementation, T.N., G.Y. and T.L.; Investigation, T.N., G.Y. and T.L.; Writing—original draft, T.N., G.Y. and T.L.; editing, T.N.; Supervision, U.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The data presented in this study are available on request from the corresponding author. The data are not publicly available due to privacy.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Geraci, G.; Garcia-Rodriguez, A.; Giordano, L.G.; López-Pérez, D.; Björnson, E. Understanding UAV cellular communications: From existing networks to massive MIMO. IEEE Access 2018, 6, 67853–67865. [Google Scholar] [CrossRef]
  2. Bernhard, D.; Lovejoy, J.P.; Ann-Kathrin, H.; Brittany, N.H. Facebook and Online Privacy: Attitudes, Behaviors and Unintended Consequences. J. Comput.-Mediat. Commun. 2009, 15, 83–108. [Google Scholar]
  3. Said, W.; Mostafa, A. Towards a hybrid immune algorithm based on danger theory for database security. IEEE Access 2020, 8, 145332–145362. [Google Scholar] [CrossRef]
  4. Sai, A.M.V.; Li, Y. A Survey on privacy issues in mobile social networks. IEEE Access 2020, 8, 130906–130921. [Google Scholar]
  5. Madejski, M.; Johnson, M.; Bellovin, S. The Failure of Online Social Privacy Settings; Department of Computer Science, Columbia University: New York, NY, USA, 2011. [Google Scholar]
  6. Lyon, D. Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination; Routledge: London, UK, 2003; pp. 154–196. [Google Scholar]
  7. Badun, L.; Denney, K.; Celik, Z.B.; McDaniel, P.; Uluagac, A.S. A survey on IoT platforms: Communication security, and privacy perspectives. Comput. Netw. 2021, 192, 108040. [Google Scholar]
  8. Tclo@ucsc.edu. The Dangers of the Internet of Things. Dangerous World. Available online: https://dangerousworld.soe.ucsc.edu/2018/03/25/the-dangers-of-the-internet-of-things/ (accessed on 25 March 2018).
  9. Cerruto, F.; Cirillo, S.; Desiato, D.; Gambardella, S.M.; Polese, G. Social network data analysis to highlight privacy threats. J. Big Data 2022, 9, 19. [Google Scholar] [CrossRef]
  10. Kang, R.; Dabbish, L.; Fruchter, N.; Kiiesler, S. “My data just goes everywhere:” User mental models of the internet and implications for privacy and security. In Proceedings of the Eleventh Symposium on Usable Privacy and Security, Ottawa, ON, Canada, 22–24 July 2015. [Google Scholar]
  11. Breve, B.; Cimino, G.; Deufemia, V. Identifying security and privacy violation rules in trigger-action IoT platforms with NLP models. IEEE Internet Things J. 2023, 10, 5607–5622. [Google Scholar] [CrossRef]
  12. Misra, G.; Such, J.M. How socially aware are social privacy controls. Computer 2016, 49, 96–99. [Google Scholar] [CrossRef]
  13. Alan, A.; Al-Arnaout, Z.; Topcu, A.; Zaki, C.; Shdefat, A.; Wlbasi, E. How do default privacy settings on social apps match people’s actual preferences. In Proceedings of the 2022 International Conference on Electrical and Computing Technologies and Applications, Ras Al Khaimah, United Arab Emirates, 23–25 November 2022; pp. 101–107. [Google Scholar]
  14. Cengiz, A.B.; Guler, K.; Boluk, P.S. The effect of social media behaviors on security and privacy threats. IEEE Access 2022, 10, 57674–57684. [Google Scholar] [CrossRef]
  15. Barth, S.; Jonh, M.; Junger, M.; Hartel, P.; Roppelt, J. Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial. Telemat. Inform. 2019, 41, 55–69. [Google Scholar] [CrossRef]
  16. Hu, X.; Zhu, T.; Zhai, X.; Zhou, W.; Zhao, W. Privacy data propagation and preservation in social media: A real-world case study. IEEE Trans. Knowl. Data Eng. 2021, 35, 4137–4150. [Google Scholar] [CrossRef]
  17. Hou, Q.; Han, M.; Cai, Z. Survey on data analysis in social media: A practical application aspect. Big Data Min. Anal. 2020, 3, 259–279. [Google Scholar] [CrossRef]
  18. Spiekermann, S.; Grossklags, J.; Berendt, B. E-privacy in 2nd generation E-commerce: Privacy preferences versus actual behavior. In Proceedings of the 3rd ACM conference on Electronic Commerce, Tampa, FL, USA, 14–17 October 2001; pp. 38–47. [Google Scholar]
  19. Wagenseil, P. The One Router Setting Everyone Should Change (But No One Does). Tom’s Guide. Available online: https://www.tomsguide.com/us/change-router-default-passwords,news-26975.html (accessed on 13 April 2018).
  20. Darmawan, I.; Maulana, M.; Gunawan, R.; Widiyasono, N. Evaluating web scraping performance using XPath, CSS selector, regular expression, and HTML DOM with multiprocessing. Int. J. Inform. Vis. 2022, 6, 904–910. [Google Scholar] [CrossRef]
  21. Leopard Web Wentworth Institute of Technology. Available online: https://cas.wit.edu/cas/login (accessed on 15 April 2023).
  22. Meta Privacy Center. Available online: https://www.facebook.com/privacy/policies/cookies/?entry_point=cookie_policy_redirect&entry=0 (accessed on 15 June 2023).
  23. Statement of Right and Responsibilities. Available online: https://www.facebook.com/legal/terms/previous (accessed on 15 June 2023).
  24. Facebook Terms of Service. Available online: https://m.facebook.com/legal/terms (accessed on 15 June 2023).
  25. Facebook Data Policy. Available online: https://m.facebook.com/privacy/policy/version/20220104/#how-we-use-information (accessed on 15 June 2023).
  26. Amazon Privacy Notice. Available online: https://www.amazon.com.be/-/en/gp/help/customer/display.html?nodeId=GX7NJQ4ZB8MHFRNJ (accessed on 18 June 2023).
  27. Interest-Based Ads. Available online: https://www.amazon.com/gp/help/customer/display.html?nodeId=GLVB9XDF9M8MU7UZ (accessed on 18 June 2023).
  28. Conditions of Use. Available online: https://www.amazon.com/gp/help/customer/display.html?nodeId=GLSBYFE9MGKKQXXM (accessed on 18 June 2023).
  29. TikTok Privacy Policy. Available online: https://www.tiktok.com/legal/page/us/privacy-policy/en (accessed on 20 June 2023).
  30. TikTok Terms of Service. Available online: https://www.tiktok.com/legal/page/us/terms-of-service/en (accessed on 20 June 2023).
  31. Linkedin Privacy Policy. Available online: https://www.linkedin.com/legal/privacy-policy (accessed on 22 June 2023).
  32. Linkedin User Agreement. Available online: https://www.linkedin.com/legal/user-agreement (accessed on 22 June 2023).
  33. Snap Inc. Custom Creative Tools Terms. Available online: https://snap.com/ar/terms/custom-creative-tools (accessed on 24 June 2023).
  34. Snap Inc. Privacy and Safety Hub. Available online: https://values.snap.com/privacy/privacy-center (accessed on 24 June 2023).
  35. Snap Inc. Cookie Policy. Available online: https://www.snap.com/en-US/cookie-policy (accessed on 24 June 2023).
  36. Twitter Terms of Service. Available online: https://twitter.com/en/tos (accessed on 26 June 2023).
  37. Twitter Privacy Policy. Available online: https://twitter.com/en/privacy (accessed on 26 June 2023).
  38. YouTube Terms of Service. Available online: https://www.youtube.com/t/terms (accessed on 28 June 2023).
  39. Google Privacy & Terms. Available online: https://policies.google.com/privacy (accessed on 28 June 2023).
  40. Pinterest Terms of Service. Available online: https://policy.pinterest.com/en/terms-of-service (accessed on 29 June 2023).
  41. Pinterest Privacy Policy. Available online: https://policy.pinterest.com/en/privacy-policy (accessed on 29 June 2023).
  42. Sadq, Z.; Sabir, H.; Saeed, V. Analysing the amazon success strategies. J. Process Manag. New Technol. 2018, 6, 65–70. [Google Scholar]
  43. Alzhrani, A.; Alatawi, A.; Alsharari, B.; Albalawi, U.; Mustafa, M. Towards security awareness of mobile application using semantic-based sentiment analysis. Int. J. Adv. Comput. Sci. Appl. 2022, 13, 800–809. [Google Scholar] [CrossRef]
  44. Gibson, B.; Townes, S.; Lewis, D.; Bhunia, S. Vulnerability in massive API scraping: 2021 linkedIn data breach. In Proceedings of the 2021 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 15–17 December 2021. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.