Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2207676.2207730acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

The implications of offering more disclosure choices for social location sharing

Published: 05 May 2012 Publication History

Abstract

We compared two privacy configuration styles for specifying rules for social sharing one's past locations. Our findings suggest that location-sharing applications (LSAs) which support varying levels of location granularities are associated with sharing rules that are less convoluted, are less likely to be negatively phrased, and can lead to more open sharing; users are also more comfortable with these rules. These findings can help inform LSA privacy designs.

References

[1]
Ackerman, M. S., Cranor, L. F. and Reagle, J. (1999). Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences. In E-Commerce '99, 1--8.
[2]
Anthony, D., Kotz, D. and Henderson, T. (2007). Privacy in Location-Aware Computing Environments. IEEE Pervasive Computing, 6 (4), 64--72.
[3]
Barkhuus, L., Brown, B., Bell, M., et al. (2008). From Awareness to Repartee: Sharing Location within Social Groups. In CHI '08, 497--506.
[4]
Benisch, M., Kelley, P. G., Sadeh, N., et al. (2011). Capturing Location Privacy Preferences: Quantifying Accuracy and User Burden Tradeoffs. PUC, to appear.
[5]
Chernev, A.(2003). When More Is Less and Less Is More: The Role of Ideal Point Availability and Assortment in Consumer Choice. Journal of Consumer Research, 30 (2), 170--183.
[6]
Consolvo, S., Smith, I., Matthews, T., et al. (2005). Location Disclosure to Social Relations: Why, When, & What People Want to Share. In CHI '05, 82--90.
[7]
Ellison, N. B., Steinfield, C. and Lampe, C. (2007). The Benefits of Facebook "Friends:" Social Capital and College Students' Use of Online Social Network Sites. Journal of Computer Mediated Communication, 12 (4), article 1.
[8]
Hsieh, G., Tang, K. P., Low, W. Y., et al. Field Deployment of Imbuddy: A Study of Privacy Control and Feedback Mechanisms for Contextual Im. In Ubicomp '07, 91--108.
[9]
Iachello, G., Smith, I., Consolvo, S., et al. Control, Deception, & Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service. In Ubicomp '05, 213--231.
[10]
Lancaster, K. (1990). The Economics of Product Variety: A Survey. Marketing Science, 9 (3), 189--206.
[11]
Lin, J., Xiang, G., Hong, J. I., et al. Modeling People's Place Naming Preferences in Location Sharing. Ubicomp '10, 75--84.
[12]
Patil, S. and Lai, J. (2005). Who Gets to Know What When: Configuring Privacy Preferences in an Awareness Application. In CHI '05, 101--110.
[13]
Sadeh, N., Hong, J. I., Cranor, L., et al. (2008). Understanding and Capturing People's Privacy Policies in a Mobile Social Networking Application. PUC, 13 (6), 401--412.
[14]
Tang, J. C., Yankelovich, N., Begole, J., et al. (2001). Connexus to Awarenex: Extending Awareness to Mobile Users. In CHI '01, 221--228.
[15]
Tang, K. P., Lin, J., Hong, J. I., et al. (2010). Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. Purpose-Driven Location Sharing. In Ubicomp '10, 85--94.

Cited By

View all
  • (2024)Overview of Usable Privacy Research: Major Themes and Research DirectionsThe Curious Case of Usable Privacy10.1007/978-3-031-54158-2_3(43-102)Online publication date: 20-Mar-2024
  • (2023)Designing Alternative Form-Autocompletion Tools to Enhance Privacy Decision-making and Prevent Unintended DisclosureACM Transactions on Computer-Human Interaction10.1145/361036630:6(1-42)Online publication date: 25-Sep-2023
  • (2023)“Hello, Fellow Villager!”: Perceptions and Impact of Displaying Users’ Locations on WeiboHuman-Computer Interaction – INTERACT 202310.1007/978-3-031-42286-7_29(511-532)Online publication date: 25-Aug-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CHI '12: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
May 2012
3276 pages
ISBN:9781450310154
DOI:10.1145/2207676
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 May 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. configuration
  2. location sharing
  3. privacy
  4. rules

Qualifiers

  • Research-article

Conference

CHI '12
Sponsor:

Acceptance Rates

Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

Upcoming Conference

CHI 2025
ACM CHI Conference on Human Factors in Computing Systems
April 26 - May 1, 2025
Yokohama , Japan

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)1
Reflects downloads up to 10 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Overview of Usable Privacy Research: Major Themes and Research DirectionsThe Curious Case of Usable Privacy10.1007/978-3-031-54158-2_3(43-102)Online publication date: 20-Mar-2024
  • (2023)Designing Alternative Form-Autocompletion Tools to Enhance Privacy Decision-making and Prevent Unintended DisclosureACM Transactions on Computer-Human Interaction10.1145/361036630:6(1-42)Online publication date: 25-Sep-2023
  • (2023)“Hello, Fellow Villager!”: Perceptions and Impact of Displaying Users’ Locations on WeiboHuman-Computer Interaction – INTERACT 202310.1007/978-3-031-42286-7_29(511-532)Online publication date: 25-Aug-2023
  • (2021)This Website Uses Nudging: MTurk Workers' Behaviour on Cookie Consent NoticesProceedings of the ACM on Human-Computer Interaction10.1145/34760875:CSCW2(1-22)Online publication date: 18-Oct-2021
  • (2021)(Un)clear and (In)conspicuousProceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society10.1145/3463676.3485598(59-72)Online publication date: 15-Nov-2021
  • (2020)Multiple Purposes, Multiple Problems: A User Study of Consent Dialogs after GDPRProceedings on Privacy Enhancing Technologies10.2478/popets-2020-00372020:2(481-498)Online publication date: 8-May-2020
  • (2019)Bringing Design to the Privacy TableProceedings of the 2019 CHI Conference on Human Factors in Computing Systems10.1145/3290605.3300492(1-17)Online publication date: 2-May-2019
  • (2018)Studying users’ adaptation to Android’s run-time fine-grained access control systemJournal of Information Security and Applications10.1016/j.jisa.2018.02.00440(31-43)Online publication date: Jun-2018
  • (2018)Privacy in Social Information AccessSocial Information Access10.1007/978-3-319-90092-6_2(19-74)Online publication date: 3-May-2018
  • (2018)User attitudes and behaviors toward personalized control of privacy settings on smartphonesConcurrency and Computation: Practice and Experience10.1002/cpe.488431:22Online publication date: 29-Aug-2018
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media