Abstract
While privacy perceptions and behaviors have been investigated in Western societies, little is known about these issues in non-Western societies. To bridge this gap, we interviewed 30 Google personal account holders in Saudi Arabia about their privacy perceptions and behaviors regarding the activity data that Google saves about them. Our study focuses on Google’s Activity Controls, which enable users to control whether, and how, Google saves their Web & App Activity, Location History, and YouTube History. Our results show that although most participants have some level of awareness about Google’s data practices and the Activity Controls, many have only vague awareness, and the majority have not used the available controls. When participants viewed their saved activity data, many were surprised by what had been saved. While many participants find Google’s use of their data to improve the services provided to them acceptable, the majority find the use of their data for ad purposes unacceptable. We observe that our Saudi participants exhibit similar trends and patterns in privacy awareness, attitudes, preferences, concerns, and behaviors to what has been found in studies in the US. Our results emphasize the need for: 1) improved techniques to inform users about privacy settings during account sign-up, to remind users about their settings, and to raise awareness about privacy settings; 2) improved privacy setting interfaces to reduce the costs that deter many users from changing the settings; and 3) further research to explore privacy concerns in non-Western cultures.
Eman Alashwali was a Collaborating Visitor at CMU while working on this paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Although this point was mentioned only by a pilot participant, we believe it is a reason worth surfacing.
- 2.
An additional participant said “yes” to this questions, but missed Sect. 4.4’s questions due to an error.
- 3.
This question was added after P1 interview was done. Thus, 29/30 participants were asked this question.
References
Almuhimedi, H., et al.: Your location has been shared 5,398 times! A field study on mobile app privacy nudging. In: Proceedings of CHI Conference on Human Factors in Computing Systems, pp. 787–796 (2015)
AlSagri, H.S., AlAboodi, S.S.: Privacy awareness of online social networking in Saudi Arabia. In: Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), pp. 1–6 (2015)
Balebako, R., Jung, J., Lu, W., Cranor, L.F., Nguyen, C.: “Little brothers watching you”: raising awareness of data leaks on smartphones. In: Proceedings of Symposium on Usable Privacy and Security (SOUPS), pp. 1–11 (2013)
Brave Software, Inc.: Brave Browser (2022). https://brave.com. Accessed 15 Nov 2022
Brignull, H.: Deceptive Design (2013). https://www.deceptive.design. Accessed 14 Nov 2022
Brooks, J., King, N.: Doing Template Analysis: Evaluating an End of Life Care Service. SAGE Research Methods Cases Part 1 (2014)
Chen, Y., et al.: Demystifying hidden privacy settings in mobile apps. In: Proceedings of IEEE Symposium on Security and Privacy (SP), pp. 570–586 (2019)
Colnago, J., Cranor, L.F., Acquisti, A.: Is there a reverse privacy paradox? An exploratory analysis of gaps between privacy perspectives and privacy-seeking behaviors. Priv. Enh. Technol. (PoPETS) 3(1), 455–476 (2023)
DuckDuckGo: DuckDuckGo (2022). https://duckduckgo.com. Accessed 25 May 2022
Ellison, N.B., Steinfield, C., Lampe, C.: The benefits of facebook “friends:” social capital and college students’ use of online social network sites. J. Comput.-Mediat. Commun. 12, 1143–1168 (2007)
Farke, F.M., Balash, D.G., Golla, M., Dürmuth, M., Aviv, A.J.: Are privacy dashboards good for end users? Evaluating user perceptions and reactions to Google’s my activity. In: USENIX Security Symposium, pp. 483–500 (2021)
Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of Symposium on Usable Privacy and Security (SOUPS), pp. 1–14 (2012)
General Authority for Statistics (GAS): Statistical Year Book - Chapter 01 \(|\) Population & Demography (2019). https://www.stats.gov.sa/en/1007-0. Accessed 19 Aug 2023
General Authority for Statistics (GAS): Statistical Year Book - Chapter 04 \(|\) Education and Training (2019). https://www.stats.gov.sa/en/1010-0. Accessed 19 Aug 2023
General Authority for Statistics (GAS): Statistical Year Book - Chapter 15 \(|\) Technology and Communication (2019). https://www.stats.gov.sa/en/1021. Accessed 22 Aug 2023
Germain, T.: Google Settings Still Confusing After \$85 Million Lawsuit Over How Confusing They Were (2022). https://gizmodo.com/google-location-history-setting-confusing-settlement-1849619287. Accessed 23 Nov 2022
GMI Blogger: Saudi Arabia Social Media Statistics 2022 (2022). https://www.globalmediainsight.com/blog/saudi-arabia-social-media-statistics/. Accessed 3 July 2022
Google: Google (2021). https://google.com
Google: Browse in Private (2022). https://support.google.com/chrome/answer/95464?hl=en&co=GENIE.Platform=Android. Accessed 25 May 2022
Google: The Google Phone (2022). https://pixel.google. Accessed 12 Oct 2022
Green, M.: Why I’m Done With Chrome (2018). https://blog.cryptographyengineering.com/2018/09/23/why-im-leaving-chrome. Accessed 15 July 2022
Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of ACM Workshop on Privacy in the Electronic Society, pp. 71–80 (2005)
Habib, H., et al.: “It’s a Scavenger Hunt”: usability of websites’ opt-out and data deletion choices. In: Proceedings of CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2020)
Habib, H., Pearman, S., Young, E., Saxena, I., Zhang, R., Cranor, L.F.: Identifying user needs for advertising controls on Facebook. ACM Hum.-Comput. Interact. 6(CSCW1), 1–42 (2022)
Haque, E.U., Khan, M.M.H., Fahim, M.A.A.: The nuanced nature of trust and privacy control adoption in the context of Google. In: Proceedings of CHI Conference on Human Factors in Computing Systems (2023)
Haselton, T.: How to Find Out What Google Knows About You and Limit the Data it Collects (2017). https://www.cnbc.com/2017/11/20/what-does-google-know-about-me.html. Accessed 22 July 2022
Heyman, R., De Wolf, R., Pierson, J.: Evaluating social media privacy settings for personal and advertising purposes. Info 16(4), 18–32 (2014)
Jung, J., Han, S., Wetherall, D.: Short paper: enhancing mobile application permissions with runtime feedback and constraints. In: Proceedings of Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 45–50 (2012)
Kang, C.: Google Agrees to \$392 Million Privacy Settlement With 40 States (2022). https://www.nytimes.com/2022/11/14/technology/google-privacy-settlement.html. Accessed 23 Nov 2022
KAU: King Abdulaziz University (2023). https://kau.edu.sa/Home.aspx
Kemp, S.: Digital 2022: Saudi Arabia (2022). https://datareportal.com/reports/digital-2022-saudi-arabia. Accessed 3 July 2022
Kerns, T.: Gmail Now has More than 1.5 Billion Active Users (2018). https://www.androidpolice.com/2018/10/26/gmail-now-1-5-billion-active-users. Accessed 19 Oct 2022
Khan, M.T., Hyun, M., Kanich, C., Ur, B.: Forgotten but not gone: identifying the need for longitudinal data management in cloud storage. In: Proceedings of CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018)
King, N.: Template Analysis (2022). https://research.hud.ac.uk/research-subjects/human-health/template-analysis/. Accessed 26 June 2022
Lau, J., Zimmerman, B., Schaub, F.: Alexa, are you listening? Privacy perceptions, concerns and privacy-seeking behaviors with smart speakers. ACM Hum.-Comput. Interact. 2(CSCW), 1–31 (2018)
LinkedIn: LinkedIn (2022). https://www.linkedin.com. Accessed 11 Oct 2022
Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing Facebook privacy settings: user expectations vs. reality. In: Proceedings of the ACM SIGCOMM Conference on Internet Measurement Conference, pp. 61–70 (2011)
Madejski, M., Johnson, M., Bellovin, S.M.: A study of privacy settings errors in an online social network. In: Proceedings of IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 340–345 (2012)
Malkin, N., Deatrick, J., Tong, A., Wijesekera, P., Egelman, S., Wagner, D.: Privacy attitudes of smart speaker users. Priv. Enh. Technol. (PoPETS) 4, 250–271 (2019)
McDonald, N., Schoenebeck, S., Forte, A.: Reliability and inter-rater reliability in qualitative research: norms and guidelines for CSCW and HCI practice. Proc. ACM Hum.-Comput. Interact. 3(CSCW), 1–23 (2019)
Meenagh, B., Tucker, L.: Saudi Arabia’s Data Protection Law Enters into Force (2023). https://www.lw.com/en/offices/admin/upload/SiteAttachments/Saudi-Arabias-data-protection-law-enters-into-force.pdf
Meta: Facebook (2022). https://facebook.com. Accessed 11 Oct 2022
Mozilla: Private Browsing (2022). https://support.mozilla.org. Accessed 25 May 2022
Nissenbaum, H.: Privacy as contextual integrity. Wash. L. Rev. 79(1), 119–157 (2004)
OPEC: Saudi Arabia Facts and Figures (2021). https://www.opec.org/opec_web/en/about_us/169.htm. Accessed 12 Jan 2021
Piriform Software Ltd: CCleaner (2022). https://www.ccleaner.com/. Accessed 25 May 2022
Ramokapane, K.M., Mazeli, A.C., Rashid, A.: Skip, skip, skip, accept!!!: A study on the usability of smartphone manufacturer provided default features and user privacy. Priv. Enhanc. Technol. (PoPETS) 2019(2), 209–227 (2019)
Rashidi, Y., Vaniea, K., Camp, L.J.: Understanding Saudis’ privacy concerns when using WhatsApp. In: Proceedings of Usable Security and Privacy (USEC) (2016)
Read It Later, Inc: Pocket (2021). https://getpocket.com. Accessed 25 May 2022
Shih, F., Liccardi, I., Weitzner, D.: Privacy tipping points in smartphones privacy preferences. In: Proceedings of CHI Conference on Human Factors in Computing Systems, pp. 807–816 (2015)
Sotirakopoulos, A., Hawkey, K., Beznosov, K.: On the challenges in usable security lab studies: lessons learned from replicating a study on SSL warnings. In: Proceedings of Symposium on Usable Privacy and Security (SOUPS), pp. 1–18 (2011)
Stutzman, F., Grossy, R., Acquisti, A.: Silent listeners: the evolution of privacy and disclosure on Facebook. J. Priv. Confidentiality 4(2), 7–41 (2012)
Twitter, Inc.: Twitter (2022). https://twitter.com. Accessed 11 Oct 2022
Wang, Y., Leon, P.G., Acquist, A., Cranor, L.F., Forget, A., Sadeh, N.: A field trial of privacy nudges for Facebook. In: Proceedings of CHI Conference on Human Factors in Computing Systems, pp. 2367–2376 (2014)
WhatsApp LLC: WhatsApp (2022). https://www.whatsapp.com. Accessed 11 Oct 2022
Wikipedia: Saudi Arabia (2021). https://en.wikipedia.org/wiki/Saudi_Arabia. Accessed 11 Mar 2021
Willis, L.E.: Why not privacy by default? Berkeley Tech. LJ 29(4), 1–57 (2014)
Zeng, E., Mare, S., Roesner, F.: End user security & privacy concerns with smart homes. In: Proceedings of Symposium on Usable Privacy and Security (SOUPS), pp. 65–80 (2017)
Zheng, S., Apthorpe, N., Chetty, M., Feamster, N.: User perceptions of smart home IoT privacy. ACM Hum.-Comput. Interact. 2(CSCW), 1–20 (2018)
Zoom: Zoom (2022). https://zoom.us. Accessed 11 Oct 2022
Acknowledgment
Eman Alashwali acknowledges the financial support of the Ibn Rushd Program at King Abdullah University of Science and Technology (KAUST). We thank Reema Bamakhramah and Sara Alashwali for their help in transcribing the interviews. We especially thank the three pilot participants for their valuable feedback. We thank all the participants for their time and valuable insights.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Alashwali, E., Cranor, L. (2024). Privacy Perceptions and Behaviors of Google Personal Account Holders in Saudi Arabia. In: Moallem, A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2024. Lecture Notes in Computer Science, vol 14728. Springer, Cham. https://doi.org/10.1007/978-3-031-61379-1_1
Download citation
DOI: https://doi.org/10.1007/978-3-031-61379-1_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-61378-4
Online ISBN: 978-3-031-61379-1
eBook Packages: Computer ScienceComputer Science (R0)