Android Permissions: User Attention, Comprehension, and Behavior
Android Permissions: User Attention, Comprehension, and Behavior
ABSTRACT data or sends premium SMS messages for profit. Grayware and
Android’s permission system is intended to inform users about the malware have both been found in the Android Market, and the rate
risks of installing applications. When a user installs an application, of new malware is increasing over time [17, 46].
he or she has the opportunity to review the application’s permission Google does not review or restrict Android applications. Instead,
requests and cancel the installation if the permissions are excessive Android uses permissions to alert users to privacy- or security-
or objectionable. We examine whether the Android permission sys- invasive applications. When a user initiates the process of installing
tem is effective at warning users. In particular, we evaluate whether an application, he or she is shown the list of permissions that the
Android users pay attention to, understand, and act on permission application requests. This list identifies all of the phone resources
information during installation. We performed two usability stud- that the application will have access to if it is installed. For exam-
ies: an Internet survey of 308 Android users, and a laboratory study ple, an application with the SEND_SMS permission can send text
wherein we interviewed and observed 25 Android users. Study par- messages, but an application without that permission cannot. If the
ticipants displayed low attention and comprehension rates: both the user is not comfortable with the application’s permission requests,
Internet survey and laboratory study found that 17% of participants then he or she can cancel the installation. Users are not shown per-
paid attention to permissions during installation, and only 3% of In- missions at any time other than installation.
ternet survey respondents could correctly answer all three permis- In this paper, we explore whether Android permissions are us-
sion comprehension questions. This indicates that current Android able security indicators that fulfill their stated purpose: “inform the
permission warnings do not help most users make correct security user of the capabilities [their] applications have” [5]. We base our
decisions. However, a notable minority of users demonstrated both inquiry on Wogalter’s Communication-Human Information Process-
awareness of permission warnings and reasonable rates of compre- ing (C-HIP) model, which provides a framework for structuring
hension. We present recommendations for improving user attention warning research [44]. The C-HIP model identifies a set of steps
and comprehension, as well as identify open challenges. between the delivery of a warning and the user’s final behavior. We
connect each step with a research question:
Categories and Subject Descriptors 1. Attention switch and maintenance. Do users notice permis-
H.5.2 [Information Interfaces and Presentation]: User Interfaces; sions before installing an application? A user needs to switch
D.4.6 [Software]: Security and Protection—Access controls focus from the primary task (i.e., installation) to the per-
mission warnings, and she needs to focus on the permission
warnings for long enough to read and evaluate them.
General Terms 2. Comprehension and memory. Do users understand how per-
Human Factors, Security missions correspond to application risks? Users need to un-
derstand the scope and implications of permissions.
Keywords 3. Attitudes and belief. Do users believe that permissions accu-
rately convey risk? Do users trust the permission system to
Android, smartphones, mobile phones, usable security limit applications’ abilities?
4. Motivation. Are users motivated to consider permissions?
1. INTRODUCTION Do users care about their phones’ privacy and security? Do
Android supports a booming third-party application market. As they view applications as threats?
of July 2011, the Android Market included more than 250, 000 5. Behavior. Do permissions influence users’ installation deci-
applications, which have been downloaded more than six billion sions? Do users ever cancel installation because of permis-
times [34]. Unfortunately, the growth in the Android platform has sions? Users should not install applications whose permis-
triggered the interest of unscrupulous application developers. An- sions exceed their comfort thresholds.
droid grayware collects excessive amounts of personal information
(e.g., for aggressive marketing campaigns), and malware harvests Each step is critical: a failure of usability at any step will render all
subsequent steps irrelevant.
We performed two usability studies to address the attention, com-
Copyright is held by the author/owner. Permission to make digital or hard prehension, and behavior questions. First, we surveyed 308 An-
copies of all or part of this work for personal or classroom use is granted droid users with an Internet questionnaire to collect data about their
without fee.
Symposium on Usable Privacy and Security (SOUPS) 2012, July 11-13, understanding and use of permissions. Next, we observed and in-
2012, Washington, DC, USA. terviewed 25 Android users in a laboratory study to gather nuanced
data. The two studies serve to confirm and validate each other. We
do not study attitudes or motivation because we find that most users
fail to pass the attention and comprehension steps.
Our primary findings are:
asked respondents to complete the three Westin index questions,1 with the newer version of the Android Market. Google released
tell us about their past actions relating to Android permissions, and a new version of the Market in August 2011, and not all phones
provide demographics information (age and gender). had been upgraded yet. We decided to focus on users with the new
Figure 2 depicts one of the quiz questions from the survey, and version of the Market to reduce study variability.
Table 3 lists the 11 quiz questions and choices. We designed the Our Craigslist advertisement yielded 112 eligible participants. In
permission quiz questions to include one completely incorrect choice order to match our participants’ ages to Android demographics [1],
and one choice to test fine-grained comprehension (e.g., whether we grouped applicants by age and selected a random proportion
they understood that a permission to read calendar events does not of people from each age group. We scheduled interviews with 30
include the privilege to edit the calendar). The set of 11 quiz ques- participants. Three people failed to attend and two people had tech-
tions included two questions about the READ_SMS permission: one nical problems with their phones, leaving us with 25 completed in-
to test the distinction between reading and sending SMS messages, terviews (12 women and 13 men). The age distribution was close to
and another to test respondents’ familiarity with the “SMS” acronym. overall Android age demographics by design, with 20% of partici-
Survey respondents received only one of these two related ques- pants between 18 and 24, 32% between 25 and 34, 20% between 35
tions, so scores for these questions were independent of each other.2 and 44, 16% between 45 and 54, and 12% older than 55. None of
All of the quiz questions had one or two correct choices, with the participants were affiliated with our institution, although some
the exception of the question about the CAMERA permission. This of the younger participants were students at other universities.
permission controls the ability to take a new photograph or video Each interview took 30–60 minutes and had six parts:
recording; it does not control access to the photo library. However,
we later discovered that all applications can view or edit the photo 1. General Android usage questions (e.g., how many applica-
library without any permission. Consequently, the correct answer tions they have installed).
to the CAMERA permission question is to select all four choices. 2. Participants were instructed to find and install an applica-
tion from the Android Market, using their own phones. We
3.2 Laboratory Study prompted them to install a “parking finder app that will help
In October 2011, we recruited 25 local Android users for a lab- [the user] locate your parked car.” This task served to con-
oratory study. The primary purpose of the laboratory study was to firm that participants were familiar with installing applica-
supplement the Internet survey with detailed and explanatory data. tions from the Android Market.
We also designed the attention and behavior portions of the inter- 3. Participants were instructed to find and install a second ap-
view to avoid any over-reporting problems that might have influ- plication from the Android Market using their own phones.
enced the Internet survey. We prompted them to:
To recruit participants, we posted a Craigslist ad for the San Pretend you are a little short on cash, so you want
Francisco Bay Area. Our advertisement offered people $60 to par- to install a coupons app. You want to be able
ticipate in an hour-long interview about how they “choose and use to find coupons and sales for groceries, your fa-
Android applications.” In order to be eligible for the laboratory vorite electronics, or clothes while you’re out shop-
study, we required that participants owned an Android phone and ping. If you already have a coupons app, pretend
used applications. We also asked study applicants to look at a you don’t like it and want a new one.
screenshot and tell us whether they had the new or old version of
the Android Market; we then secretly limited eligibility to users All of the top-ranked applications for search terms related
to this scenario had multiple permissions. During this appli-
1
The Westin index is a set of three questions designed to segment cation search process, we asked participants to tell us what
users into three groups: Privacy Fundamentalists, Privacy Pragma- they were thinking about while using the Market. We also
tists, and Privacy Unconcerned [42]. The Westin index is widely observed what user interface elements they interacted with.
used in surveys to gauge users’ attitudes towards privacy [27]. 4. Westin index questions.1
Buchanan et al. validated the Westin index for use in a computing
context by showing that it correlates with users’ privacy concerns 5. We asked participants about an application on their phone
and behavior on the Internet [9]. that they had installed and recently used. We then opened
2 the application’s information page in Settings (Figure 3) and
In the remainder of this paper, we refer to these two questions as
READ_SMS1 and READ_SMS2 , as depicted in Table 3. asked them to describe and explain the permissions.
6. We asked participants for specific details about past permission- Attention to Permissions Number of users 95% CI
related behaviors, such as whether they have ever looked up Looked at the permissions 4 17% 5% to 37%
permissions or decided not to install an application because Didn’t look, but aware 10 42% 22% to 63%
of its permissions. Is unaware of permissions 10 42% 22% to 63%
60 - 69!
50 - 59! Table 6: Can an application send text messages? The correct answer de-
40 - 49! pends on the application that the given user selected. (Lab Study, n = 25)
30 - 39!
20 - 29!
We observed that participants often placed more emphasis on the
10 - 19!
category heading than the specific permission text, which caused
0 - 9! them to err in the direction of overstating the privilege associated
0! 1! 2! 3! 4! 5! 6! with permissions. (Figure 1 shows examples of categories and spe-
Number of Users! cific permissions.) Descriptions were overly broad 29% of the time,
Figure 4: A histogram of participants’ grades. (Lab Study, n = 25) and all but 3 of the overly-broad responses could be attributed to
the category heading. For example, the READ_CONTACTS per-
mission is under the heading of “Personal Information.” Upon see-
• Unable to answer. We placed responses in this category when
ing that warning, one participant stated that the permission pro-
the participant read the permission aloud and then stated that
vided access to his passwords, and another believed that the per-
he or she could not describe the permission.
mission encompassed all of the data on her phone. Similarly, the
• Omitted. Participants often skipped permissions that were
READ_PHONE_STATE permission is under the heading of “Phone
present on the screen, and we were not always able to prompt
Calls.” Participants inferred that the warning referred to a wide
them to address the skipped permission. In these cases, we
variety of phone-related behavior, such as giving a company per-
have no way of knowing whether the participant would have
mission to make telemarketing calls to the participant.
been able to answer correctly.
Table 5: The grades of free-form participant responses for popular permissions. (Lab Study, n = 25)