Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1054972.1054985acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Article

Location disclosure to social relations: why, when, & what people want to share

Published: 02 April 2005 Publication History

Abstract

Advances in location-enhanced technology are making it easier for us to be located by others. These new technologies present a difficult privacy tradeoff, as disclosing one's location to another person or service could be risky, yet valuable. To explore whether and what users are willing to disclose about their location to social relations, we conducted a three-phased formative study. Our results show that the most important factors were who was requesting, why the requester wanted the participant's location, and what level of detail would be most useful to the requester. After determining these, participants were typically willing to disclose either the most useful detail or nothing about their location. From our findings, we reflect on the decision process for location disclosure. With these results, we hope to influence the design of future location-enhanced applications and services.

References

[1]
Ackerman, M.S., et al. "Privacy in E-Commerce: Exploring User Scenarios and Privacy Preferences," In Proc. of the ACM Conf on Electronic Commerce: EC '99, pp. 1--8.
[2]
Adams, A. "Multimedia information changes the whole privacy ballgame," In Proc. of Computers, Freedom & Privacy '00, 2000, pp. 25--32.
[3]
Barkhuus, L. and Dey, A., "Location-Based Services for Mobile Telephony: a study of users' privacy concerns," Proc. of Interact '03, Zurich, 2003, pp.709--712.
[4]
Barrett, L.F., Barrett, D.J., "An Introduction to Computerized Experience Sampling in Psychology," Social Science Computer Review, Vol. 19, No. 2, (Summer 2001), pp.175--85.
[5]
Begole J., et al. "Work rhythms: Analyzing visualizations of awareness histories of distributed groups", In Proc. of CSCW '02, pp. 334--343.
[6]
Consolvo, S. and Walker, M., "Using the Experience Sampling Method to Evaluate Ubicomp Applications," IEEE Pervasive Computing Mobile and Ubiquitous Systems, Vol. 2, No. 2, Apr-Jun 2003, pp. 24--31.
[7]
"Enhanced 911," 911 Services section, Federal Communications Commission: http://www.fcc.gov/911/enhanced/ (verified Jan 4, 2005).
[8]
"Find People Nearby," mMode section, Cingular/AT&T Wireless website: http://www.attwireless.com/personal/features/organization/findfriends.jhtml (verified Jan 4, 2005).
[9]
Goguen, J., "Are Agents an Answer or a Question?" Proc. of the JSAI-Synsophy International Workshop on Social Intelligence Design, 2001.
[10]
Hong, J.I., Landay, J.A., "Support for Location: An Architecture for Privacy-Sensitive Ubiquitous Computing," In Proc. of Mobisys '04, Boston, Jun 2004, pp.177--89.
[11]
Hong, J.I., et al. "Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems." In Proc. of DIS '04, Cambridge, MA, pp. 91--100.
[12]
Hull, R., et al. "Enabling Context-Aware and Privacy-Conscious User Data Sharing," Proc. of the IEEE International Conference on Mobile Data Management: MDM '04, pp. 187--98.
[13]
iESP software website: http://seattleweb.intel-research.net/projects/esm/iESP.html (verified Jan 6, 2005).
[14]
Kochen, Manfred, Ed. The Small World. Ablex, Norwood, NJ, 1989.
[15]
Lederer, S., Hong, J.I., Dey, A.K., Landay, J.A., "Personal Privacy through Understanding and Action: Five Pitfalls for Designers," Personal and Ubiquitous Computing, Vol. 8, Number 6, Nov 2004, pp.440--54.
[16]
Lederer, S., Mankoff, J., Dey, A.K. "Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing." In Extended Abstracts of CHI 2003, Apr 2003, pp.724--5.
[17]
Olson, J.S., et al. "Preferences for Privacy Sharing: Results & Directions," CREW Technical Report. 2004.
[18]
P&AB, "Consumer Privacy Attitudes: A Major Shift Since 2000 and Why," Privacy & American Business Newsletter, Vol. 10, Number 6, Sep 2003.
[19]
Palen, L. and Dourish, P., "Unpacking "privacy" for a networked world," Proc. of CHI '03, pp. 129--136.
[20]
Palen, L. and Salzman, M., "Voice-mail diary studies for naturalistic data capture under mobile conditions," Proc. of CSCW '02, pp. 87--95.
[21]
Sacks, H., et al. (eds), Lectures on Conversation, Blackwell Publishers Jan 1995.
[22]
Sheehan, K., "Toward a Typology of Internet Users and Online Privacy Concerns," The Information Society, Vol. 18, No. 1, 2002, pp.21--32.
[23]
Smith, I., Consolvo, S., Hightower, J., Hughes, J., Iachello, G., LaMarca, A., Scott, J., Sohn, T., Abowd, G., "Social Disclosure of Place: From Location Technology to Communication Practice," Proc of the 3rd Int'l Conf on Pervasive Computing: Pervasive '05, Munich, Germany (May 2005 - to appear).

Cited By

View all
  • (2024)Evaluating the Privacy Valuation of Personal Data on SmartphonesProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36785098:3(1-33)Online publication date: 9-Sep-2024
  • (2024)To Share or Not to Share: Understanding and Modeling Individual Disclosure Preferences in Recommender Systems for the WorkplaceProceedings of the ACM on Human-Computer Interaction10.1145/36330748:GROUP(1-28)Online publication date: 16-Feb-2024
  • (2024)Do You Need to Touch? Exploring Correlations between Personal Attributes and Preferences for Tangible Privacy MechanismsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642863(1-23)Online publication date: 11-May-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CHI '05: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
April 2005
928 pages
ISBN:1581139985
DOI:10.1145/1054972
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 April 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. experience sampling
  2. location-enhanced computing
  3. privacy
  4. privacy classification
  5. social relations
  6. ubiquitous computing

Qualifiers

  • Article

Conference

CHI05
Sponsor:

Acceptance Rates

CHI '05 Paper Acceptance Rate 93 of 372 submissions, 25%;
Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

Upcoming Conference

CHI 2025
ACM CHI Conference on Human Factors in Computing Systems
April 26 - May 1, 2025
Yokohama , Japan

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)127
  • Downloads (Last 6 weeks)9
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Evaluating the Privacy Valuation of Personal Data on SmartphonesProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36785098:3(1-33)Online publication date: 9-Sep-2024
  • (2024)To Share or Not to Share: Understanding and Modeling Individual Disclosure Preferences in Recommender Systems for the WorkplaceProceedings of the ACM on Human-Computer Interaction10.1145/36330748:GROUP(1-28)Online publication date: 16-Feb-2024
  • (2024)Do You Need to Touch? Exploring Correlations between Personal Attributes and Preferences for Tangible Privacy MechanismsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642863(1-23)Online publication date: 11-May-2024
  • (2024)Privacy of Default Apps in Apple’s Mobile EcosystemProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642831(1-32)Online publication date: 11-May-2024
  • (2024)Inter-regional Lens on the Privacy Preferences of Drivers for ITS and Future VANETsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3641997(1-20)Online publication date: 11-May-2024
  • (2024)The Price is Right? The Economic Value of Sharing SensorsIEEE Transactions on Computational Social Systems10.1109/TCSS.2023.333007111:3(3468-3482)Online publication date: Jun-2024
  • (2024)Monetary valuation of personal health data in the wildInternational Journal of Human-Computer Studies10.1016/j.ijhcs.2024.103241185(103241)Online publication date: May-2024
  • (2023)Monetary Compensation and Private Information Sharing in Augmented Reality ApplicationsInformation10.3390/info1406032514:6(325)Online publication date: 8-Jun-2023
  • (2023)A Tale of Two Cultures: Comparing Interpersonal Information Disclosure Norms on TwitterProceedings of the ACM on Human-Computer Interaction10.1145/36100457:CSCW2(1-40)Online publication date: 4-Oct-2023
  • (2023)DIPA : An Image Dataset with Cross-cultural Privacy Concern AnnotationsCompanion Proceedings of the 28th International Conference on Intelligent User Interfaces10.1145/3581754.3584176(259-266)Online publication date: 27-Mar-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media