Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2627393.2627416acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
short-paper

Short paper: "here i am, now pay me!": privacy concerns in incentivised location-sharing systems

Published: 23 July 2014 Publication History

Abstract

Social network sites, location-sharing services and, more recently, applications enabling the quantified self, mean that people are generating and sharing more data than ever before. It is important to understand the potential privacy impacts when such personal data are commercialised, to ensure that expectations of privacy are preserved. This paper presents the first user study of incentivised location sharing, where people are given a direct monetary incentive to share their location with a business or their social network. We use Nissenbaum's framework of contextual integrity in a preliminary user study (n=22) to investigate potential privacy risks with such services. We find that monetisation changes why people share their data, but not the frequency of disclosures. Our results motivate further study and are useful for designers of location-sharing systems and researchers who wish to leverage the diverse range of personal data that are available in a privacy-sensitive manner.

References

[1]
D. Anthony, T. Henderson, and D. Kotz. Privacy in location-aware computing environments. IEEE Pervasive Computing, 6(4):64--72, Oct. 2007.
[2]
C. Aperjis and B. A. Huberman. A market for unbiased private data: Paying individuals according to their privacy attitudes. First Monday, 17(5--7), May 2012.
[3]
L. Barkhuus. The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI. In Proc. CHI, pages 367--376, May 2012.
[4]
H. Cramer, M. Rost, and L. E. Holmquist. Performing a check-in: emerging practices, norms and "conflicts" in location-sharing using foursquare. In Proc. MobileHCI, pages 57--66, Aug. 2011.
[5]
F. S. Grodzinsky and H. T. Tavani. Privacy in "the cloud": applying Nissenbaum's theory of contextual integrity. ACM SIGCAS Computers and Society, 41(1):38--47, Oct. 2011.
[6]
J. Grossklags and A. Acquisti. When 25 Cents is too much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information. In Proc. WEIS, 2007. Online at http://weis2007.econinfosec.org/papers/66.pdf.
[7]
J. M. Hektner, J. A. Schmidt, and M. Csikszentmihalyi. Experience sampling method: measuring the quality of everyday life. SAGE Publications, Thousand Oaks, CA, USA, 2007.
[8]
L. Hutton and T. Henderson. An architecture for ethical and privacy-sensitive social network experiments. SIGMETRICS Perform. Eval. Rev., 40(4):90--95, Apr. 2013.
[9]
E. A. Jones and J. W. Janes. Anonymity in a world of digital books: Google Books, privacy, and the freedom to read. Policy & Internet, 2(4):42--74, Jan. 2010.
[10]
P. G. Kelley, M. Benisch, L. F. Cranor, and N. Sadeh. When are users comfortable sharing locations with advertisers? In Proc. CHI, pages 2449--2452, May 2011.
[11]
J. Lindqvist, J. Cranshaw, J. Wiese, J. Hong, and J. Zimmerman. I'm the mayor of my house: examining why people use foursquare - a social-driven location sharing application. In Proc. CHI, pages 2409--2418, May 2011.
[12]
H. R. Lipford, G. Hull, C. Latulipe, A. Besmer, and J. Watson. Visible flows: Contextual integrity and the design of privacy mechanisms on social network sites. In Proc. CSE, volume 4, pages 985--989, Aug. 2009.
[13]
N. K. Malhotra, S. S. Kim, and J. Agarwal. Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4):336--355, Dec. 2004.
[14]
A. M. McDonald and L. F. Cranor. The cost of reading privacy policies. I/S: A Journal of Law and Pol- icy for the Information Society, 4(3):540--565, 2008. Online at http://www.is-journal.org/files/2012/02/Cranor_Formatted_Final.pdf.
[15]
C. C. Miller. Take a step closer for an invitation to shop. New York Times, page B4, Feb. 23 2010. Online at http://www.nytimes.com/2010/02/23/business/media/23adco.html.
[16]
H. Nissenbaum. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford Law Books, Stanford, CA, USA, 2009.
[17]
X. Page, B. P. Knijnenburg, and A. Kobsa. What a tangled web we weave: lying backfires in location-sharing social media. In Proc. CSCW, pages 273--284, 2013.
[18]
S. Patil, G. Norcie, A. Kapadia, and A. J. Lee. Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice. In Proc. Eighth Symposium on Usable Privacy and Security, July 2012.
[19]
M. Rost, L. Barkhuus, H. Cramer, and B. Brown. Representation and Communication: Challenges in Interpreting Large Social Media Datasets. In Proc. CSCW, pages 357--362, 2013.
[20]
R. Schlegel, A. Kapadia, and A. J. Lee. Eyeing your exposure: quantifying and controlling information sharing for improved privacy. In Proc. SOUPS, 2011.
[21]
P. Shi, H. Xu, and Y. Chen. Using contextual integrity to examine interpersonal information boundary on social network sites. In Proc. CHI, pages 35--38, 2013.
[22]
E. D. Spiegler, C. Hildebrand, and F. Michahelles. Social networks in pervasive advertising and shopping. In J. Müller, F. Alt, and D. Michelis, editors, Pervasive Advertising, chapter 10, pages 207--225. Springer, London, UK, 2011.
[23]
K. P. Tang, J. Lin, J. I. Hong, D. P. Siewiorek, and N. Sadeh. Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing. In Proc. Ubicomp, pages 85--94, Sept. 2010.
[24]
E. Toch, J. Cranshaw, P. H. Drielsma, J. Y. Tsai, P. G. Kelley, J. Springfield, L. Cranor, J. Hong, and N. Sadeh. Empirical models of privacy in location sharing. In Proc. 12th ACMinternational conference on Ubiquitous computing, pages 129--138, Sept. 2010.
[25]
J. Y. Tsai, P. Kelley, P. Drielsma, L. F. Cranor, J. Hong, and N. Sadeh. Who's viewed you?: The impact of feedback in a mobile location-sharing application. In Proc. CHI, pages 2003--2012, Apr. 2009.
[26]
R. Unni and R. Harmon. Perceived effectiveness of push vs. pull mobile location based advertising. Journal of Interactive Advertising, 7(2):28--40, 2007.
[27]
B. Ur, P. G. Leon, L. F. Cranor, R. Shay, and Y. Wang. Smart, useful, scary, creepy: perceptions of online behavioral advertising. In Proc. SOUPS, July 2012.

Cited By

View all
  • (2022)Lessons Learned in Piloting a Digital Personalized COVID-19 “Radar” on a University CampusPublic Health Reports®10.1177/00333549221112532137:2_suppl(76S-82S)Online publication date: 21-Jul-2022
  • (2021)Errors in Geotargeted Display AdvertisingProceedings of the ACM on Human-Computer Interaction10.1145/34491665:CSCW1(1-19)Online publication date: 22-Apr-2021
  • (2021)Transferring recommendations through privacy user models across domainsUser Modeling and User-Adapted Interaction10.1007/s11257-021-09307-632:1-2(25-90)Online publication date: 8-Nov-2021
  • Show More Cited By

Index Terms

  1. Short paper: "here i am, now pay me!": privacy concerns in incentivised location-sharing systems

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WiSec '14: Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks
    July 2014
    246 pages
    ISBN:9781450329729
    DOI:10.1145/2627393
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 23 July 2014

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. contextual integrity
    2. location-sharing
    3. privacy

    Qualifiers

    • Short-paper

    Funding Sources

    Conference

    WiSec'14
    Sponsor:

    Acceptance Rates

    WiSec '14 Paper Acceptance Rate 25 of 96 submissions, 26%;
    Overall Acceptance Rate 98 of 338 submissions, 29%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)21
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 25 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Lessons Learned in Piloting a Digital Personalized COVID-19 “Radar” on a University CampusPublic Health Reports®10.1177/00333549221112532137:2_suppl(76S-82S)Online publication date: 21-Jul-2022
    • (2021)Errors in Geotargeted Display AdvertisingProceedings of the ACM on Human-Computer Interaction10.1145/34491665:CSCW1(1-19)Online publication date: 22-Apr-2021
    • (2021)Transferring recommendations through privacy user models across domainsUser Modeling and User-Adapted Interaction10.1007/s11257-021-09307-632:1-2(25-90)Online publication date: 8-Nov-2021
    • (2020)DPIA in Context: Applying DPIA to Assess Privacy Risks of Cyber Physical SystemsFuture Internet10.3390/fi1205009312:5(93)Online publication date: 24-May-2020
    • (2020)Mapping and Taking Stock of the Personal Informatics LiteratureProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/34322314:4(1-38)Online publication date: 18-Dec-2020
    • (2019)City ExplorerProceedings of the 2019 CHI Conference on Human Factors in Computing Systems10.1145/3290605.3300571(1-15)Online publication date: 2-May-2019
    • (2018)Mobile Users as AdvertisersProceedings of the 17th International Conference on Mobile and Ubiquitous Multimedia10.1145/3282894.3282929(253-264)Online publication date: 25-Nov-2018
    • (2018)Deriving Privacy Settings for Location Sharing: Are Context Factors Always the Best Choice?2018 IEEE Symposium on Privacy-Aware Computing (PAC)10.1109/PAC.2018.00015(86-94)Online publication date: Sep-2018
    • (2015)Some Challenges for Ethics in Social Network ResearchProceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research10.1145/2793013.2793023(13-15)Online publication date: 21-Aug-2015
    • (2015)SpyAwareProceedings of the 2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE)10.1109/ISSRE.2015.7381828(348-358)Online publication date: 2-Nov-2015

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media