Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1620545.1620547acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

From spaces to places: emerging contexts in mobile privacy

Published: 30 September 2009 Publication History

Abstract

Mobile privacy concerns are central to Ubicomp and yet remain poorly understood. We advocate a diversified approach, enabling the cross-interpretation of data from complementary methods. However, mobility imposes a number of limitations on the methods that can be effectively employed. We discuss how we addressed this problem in an empirical study of mobile social networking. We report on how, by combining a variation of experience sampling and contextual interviews, we have started focusing on a notion of context in relation to privacy, which is subjectively defined by emerging socio-cultural knowledge, functions, relations and rules. With reference to Gieryn's sociological work, we call this place, as opposed to a notion of context that is objectively defined by physical and factual elements, which we call space. We propose that the former better describes the context for mobile privacy.

References

[1]
Barkhuus, L. and Dey, A. Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns. Proc. INTERACT 2003. ACM Press (2003).
[2]
Consolvo, S., Smith, I.E., Matthews, T., Lamarca, A. Tabert, J., Powledge, P. Location Disclosure to Social Relations: Why, When And What People Want to Share. Proc. SIGCHI Human Factors in Computing Systems. ACM press (2005), 81--90.
[3]
Khalil, A. and Connelly, K. Context-Aware Telephony: Privacy Preferences and Sharing Patterns. Proc. CSCW 2006. ACM Press (2006), 469--478.
[4]
Price, B.A., Adam, K. and Nuseibeh, B. Keeping Ubiquitous Computing to Yourself: A Practical Model for User Control of Privacy. International Journal of Human-Computer Studies (2005). 63(1-2), 228--253.
[5]
Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M. and Rao J. Understanding and Capturing People's Privacy Policies in Mobile Social Networking Application. Journal of Personal and Ubiquitous Computing (2008). 13(6), 401--412.
[6]
http://www.usatoday.com/tech/science/2008-09-21-big-brother-restaurant_N.htm?csp=34.
[7]
Smith, H., Fitzpatrick, G., and Rogers., Y. Eliciting Reactive and Reflective Feedback for a Social Communication Tool: A Multi-Session Approach. Proc. DIS 2004. ACM Press (2004), 39--48.
[8]
Rogers, Y., et al., Why It's Worth the Hassle: The Value of In-Situ Studies When Designing Ubicomp. UbiComp 2007: Ubiquitous Computing. Springer (2007), 336--353.
[9]
Antón, A.I., Bertino, E., Li, N., Yu, T. A Roadmap for Comprehensive Online Privacy Policy Management. Commun. ACM (2007), 50(7), 109--116.
[10]
Consolvo, S. and Walker, M. Using the Experience Sampling Method to Evaluate Ubicomp Applications. Pervasive Computing, IEEE (2003), 2(2), 24--31.
[11]
O'Brien, J. Rodeen, T. Rouncefield, M., Hughes, J. At Home with the Technology: an Ethnographic Study of a Set-Top-Box Trial. ACM Transactions on Computer-Human Interaction. (1999), 6(3), 282--308.
[12]
Kindberg, T., O'Neil, E., Bevan, C., Kostakos, V., Stanton Fraser, D., Jay, T. Measuring Trust in Wi-Fi Hotspots. Proc. SIGCHI Human Factors in Computing Systems. ACM Press (2008), 173--182.
[13]
Schilit, B., Adams, N., and Want, R. Context-Aware Computing Applications. Proc. Mobile Computing Systems and Applications (1994), 85--90.
[14]
Dey, A.K., Understanding and Using Context. Personal Ubiquitous Computing (2001), 5(1), 4--7.
[15]
Ahern, S., Eckles, D., Good, N., King, S., Naaman, M., Nair, R. Over-Exposed? Privacy Patterns and Considerations in Online and Mobile Photo Sharing. Proc. SIGCHI Human Factors in Computing Systems. ACM Press (2007), 357--366.
[16]
De Guzman, E.S., Sharmin, M., and Bailey, B.P. Should I Call Now? Understanding What Context Is Considered When Deciding Whether to Initiate Remote Communication Via Mobile Devices. Proc. Graphics Interface (2007), 143--150.
[17]
Iachello, G., Truong, K.N., Abowd, G.D., Hayes, G.R., Stevens, M. Prototyping and Sampling Experience to Evaluate Ubiquitous Computing Privacy in the Real World. Proc. SIGCHI Human Factors in Computing Systems. ACM Press (2006), 1009--1018.
[18]
Miner, A.G., Glomb, T.M., and Hulin, C.L. Mood at Work: Experience Sampling Using Palmtop Computers. Symposium Experience-Sampling Methods in Organisational Research, Society for Industrial and Organisational Psychology. (2001).
[19]
Holtzblatt, K., Top Field Interviewing Mistakes: Recognizing and Preventing Them, CHI 2009 (2009).
[20]
Proust, M., A La Recherche du Temps Perdu. Grasset&N.R.F. (1912--28).
[21]
http://primma.open.ac.uk
[22]
Mancini, C., Rogers, Y., Jedrzejczyk, L., Thomas, K., Price, B.A., Joinson, A. N., Bandara, A.K., Nuseibeh, B. A Multi-Pronged Empirical Approach to Mobile Privacy Investigation. Workshop Mobile User Experience Research: Challenges, Methods&Tools, CHI 2009 (2009).
[23]
http://en.wikipedia.org/wiki/Facebook.
[24]
Gross, R., Acquisti, A., and Heinz III, J.H. Information Revelation and Privacy in Online Social Networks. Proc. ACM Workshop Privacy in the Electronic Society. ACM Press (2005), 71--80.
[25]
Acquisti, A. and Gross, R. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. PET 2006. Springer (2006), 36--58.
[26]
Joinson, A.N. Looking at, Looking Up or Keeping Up with People? Motives and Use of Facebook. Proc. SIGCHI Human Factors in Computing Systems. ACM Press (2008), 1027--1036.
[27]
Tsai, J.Y., Kelley, P., Drielsma, P., Cranor, L.F., Hong, J., Sadeh, N. Who's Viewed You? The Impact of Feedback in a Mobile Location-Sharing Application. Proc. SIGHCI Human Factors in Computing Systems. ACM Press (2009), 2003--2012.
[28]
Tolmie, P., Pycock, J., Diggins, T., MacLean, A., and Karsenty, A. Unremarkable Computing. Proc. SIGCHI Human Factors in Computing Systems. ACM Press (2002), 399--406.
[29]
Esbjörnsson, M. and Weilenmann, A. Mobile Phone Talk in Context. Dey, A., Turner, R., Kokinov, B., Leake, D. Modeling and Using Context. Springer (2005), 140--154.
[30]
Altman, I. The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding. Brooks/Cole Pub. Co (1975)
[31]
Altman, I. Privacy Regulation: Culturally Universal or Culturally Specific? Journal of Social Issues (1977), 33(3), 66--84.
[32]
Dourish, P. What We Talk About When We Talk About Context? Personal Ubiquitous Computing (2004), 8(1), 19--30.
[33]
Tamminen, S., Oulasvirta, A., Toiskallio, K., Kankainen, A. Understanding mobile contexts. Personal Ubiquitous Computing (2004), 8(2), 135--143.
[34]
Gardies, A. L'Espace au Cinéma. Méridiens Klincksieck (1993).
[35]
Harrison, S. and Dourish, P. Re-Place-Ing Space: the Roles of Place and Space in Collaborative Systems. Proc. CSCW 1996. ACM Press (1996), 67--76.
[36]
Dourish, P. Re-Space-Ing Place: "Place" and "Space" Ten Years On. Proc. CSCW 2006. ACM Press (2006), 299--308.
[37]
Gieryn, T.F. A Space for Place in Sociology. Annual Review of Sociology (2000), 26(1), 463--396.
[38]
Rogers, Y. Moving on from Weiser's Vision of Calm Computing: Engaging UbiComp Experiences. Proc. Ubicomp 2006. Springer-Verlag (2006), 404--421.

Cited By

View all
  • (2022)A Study of User Concerns about Smartphone Privacy2022 6th Cyber Security in Networking Conference (CSNet)10.1109/CSNet56116.2022.9955623(1-8)Online publication date: 24-Oct-2022
  • (2021)User Perceptions of Security and Privacy Risks with Contact Tracing AppsHCI International 2021 - Late Breaking Papers: HCI Applications in Health, Transport, and Industry10.1007/978-3-030-90966-6_10(125-139)Online publication date: 20-Nov-2021
  • (2020)A Study on the Use of Checksums for Integrity Verification of Web DownloadsACM Transactions on Privacy and Security10.1145/341015424:1(1-36)Online publication date: 28-Sep-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
UbiComp '09: Proceedings of the 11th international conference on Ubiquitous computing
September 2009
292 pages
ISBN:9781605584317
DOI:10.1145/1620545
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 September 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. context
  2. contextual interview
  3. experience sampling
  4. facebook
  5. memory phrase
  6. mobile privacy
  7. place

Qualifiers

  • Research-article

Conference

Ubicomp '09
Ubicomp '09: The 11th International Conference on Ubiquitous Computing
September 30 - October 3, 2009
Florida, Orlando, USA

Acceptance Rates

UbiComp '09 Paper Acceptance Rate 31 of 251 submissions, 12%;
Overall Acceptance Rate 764 of 2,912 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)19
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)A Study of User Concerns about Smartphone Privacy2022 6th Cyber Security in Networking Conference (CSNet)10.1109/CSNet56116.2022.9955623(1-8)Online publication date: 24-Oct-2022
  • (2021)User Perceptions of Security and Privacy Risks with Contact Tracing AppsHCI International 2021 - Late Breaking Papers: HCI Applications in Health, Transport, and Industry10.1007/978-3-030-90966-6_10(125-139)Online publication date: 20-Nov-2021
  • (2020)A Study on the Use of Checksums for Integrity Verification of Web DownloadsACM Transactions on Privacy and Security10.1145/341015424:1(1-36)Online publication date: 28-Sep-2020
  • (2020)Preserving Secrecy in Mobile Social NetworksACM Transactions on Cyber-Physical Systems10.1145/33960715:1(1-29)Online publication date: 30-Dec-2020
  • (2020)How urban places are visited by social groups? Evidence from matrix factorization on mobile phone dataTransactions in GIS10.1111/tgis.1265424:6(1504-1525)Online publication date: 30-Jun-2020
  • (2019)The Case for Privacy Awareness RequirementsCyber Law, Privacy, and Security10.4018/978-1-5225-8897-9.ch006(100-119)Online publication date: 2019
  • (2019)The Case for Privacy Awareness RequirementsCensorship, Surveillance, and Privacy10.4018/978-1-5225-7113-1.ch037(697-716)Online publication date: 2019
  • (2019)An Operational Definition of Affects in Urban Space in the Light of a Methodological Approachgeographical researches quarterly journal10.29252/geores.34.1.7334:1(73-85)Online publication date: 1-Jan-2019
  • (2019)Proposal of an Operational Model to Measure Feelings and Emotions in Urban SpaceJournal of Landscape Ecology10.2478/jlecol-2019-001412:3(34-52)Online publication date: 30-Dec-2019
  • (2019)LiveBox: A Self-Adaptive Forensic-Ready Service for DronesIEEE Access10.1109/ACCESS.2019.29420337(148401-148412)Online publication date: 2019
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media