Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1864349.1864364acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

Empirical models of privacy in location sharing

Published: 26 September 2010 Publication History

Abstract

The rapid adoption of location tracking and mobile social networking technologies raises significant privacy challenges. Today our understanding of people's location sharing privacy preferences remains very limited, including how these preferences are impacted by the type of location tracking device or the nature of the locations visited. To address this gap, we deployed Locaccino, a mobile location sharing system, in a four week long field study, where we examined the behavior of study participants (n=28) who shared their location with their acquaintances (n=373.) Our results show that users appear more comfortable sharing their presence at locations visited by a large and diverse set of people. Our study also indicates that people who visit a wider number of places tend to also be the subject of a greater number of requests for their locations. Over time these same people tend to also evolve more sophisticated privacy preferences, reflected by an increase in time- and location-based restrictions. We conclude by discussing the implications our findings.

References

[1]
}}D. Anthony, D. Kotz, and T. Henderson. Privacy in location-aware computing environments. IEEE Pervasive Computing, 6(4):64--72, 2007.
[2]
}}L. Barkhuus, B. Brown, M. Bell, S. Sherwood, M. Hall, and M. Chalmers. From awareness to repartee: sharing location within social groups. In CHI, pages 497--506, 2008.
[3]
}}M. Benisch, P. G. Kelley, N. Sadeh, T. Sandholm, L. F. Cranor, P. H. Drielsma, and J. Tsai. The impact of expressiveness on the effectiveness of privacy mechanisms for location sharing. Tech Report, 2009.
[4]
}}B. Brown, A. Taylor, S. Izadi, A. Sellen, J. Kaye, and R. Eardley. Location family values: A field trial of the whereabouts clock. In Ubicomp '07, pages 354--371. Springer-Verlag, 2007.
[5]
}}S. Consolovo, I. Smith, T. Matthews, A. LaMarca, J. Tabert, and P. Powledge. Location disclosure to social relations: Why, when, & what people want to share. In CHI '05, 2005.
[6]
}}J. Cranshaw, E. Toch, J. Hong, A. Kittur, and N. Sadeh. Bridging the gap between physical location and online social networks. Technical Report CMU-ISR-10-107, Institute for Software Research technical report, Pittsburgh, PA, 2010.
[7]
}}N. Eagle and A. S. Pentland. Reality mining: sensing complex social systems. Personal Ubiquitous Comput., 10(4):255--268, May 2006.
[8]
}}M. C. Gonzalez, C. A. Hidalgo, and A.-L. Barabasi. Understanding individual human mobility patterns. Nature, 453(7196):779--782, June 2008.
[9]
}}G. Iachello, I. Smith, S. Consolovo, G. Abowd, J. Hughes, J. Howard, F. Potter, J. Scott, T. Sohn, J. Hightower, and A. LaMarca. Control, deception, and communication: Evaluating the deployment of a location-enhanced messaging service. In Ubicomp 2005, pages 213 -- 231. Springer-Verlag, 2005.
[10]
}}P. Ingwersen. Cognitive perspectives of information retrieval interaction: Elements of a cognitive IR theory. Journal of Documentation, pages 3--50, 1996.
[11]
}}A. Khalil and K. Connelly. Context-aware telephony: Privacy preferences and sharing patterns. In CSCW '06, 2006.
[12]
}}C. Mancini, K. Thomas, Y. Rogers, B. A. Price, L. Jedrzejczyk, A. K. Bandara, A. N. Joinson, and B. Nuseibeh. From spaces to places: emerging contexts in mobile privacy. In Ubicomp '09, pages 1--10, 2009.
[13]
}}L. Palen and P. Dourish. Unpacking "privacy" for a networked world. In CHI '03: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 129--136, New York, NY, USA, 2003. ACM.
[14]
}}N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley, M. Prabaker, and J. Rao. Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing, 13(16):401 -- 412, August 2009.
[15]
}}J. Tsai, P. Kelley, P. H. Drielsma, L. F. Cranor, J. Hong. and N. Sadeh. Who's viewed you? the impact of feedback in a mobile-location system. In CHI '09. pages 2003--2012, 2009.
[16]
}}J. Tsai, P. Kelley, P. H. Drielsma, L. F. Cranor, J. Hong, and N. Sadeh. Who's viewed you? the impact of feedback in a mobile-location system. In Proceedings of the 27th international conference on Human factors in computing systems, pages 2003--2012, 2009.
[17]
}}T. Xu and Y. Cai. Feeling-based location privacy protection for location-based services. In CCS '09: Proceedings of the 16th ACM conference on Computer and communications security, pages 348--357, New York, NY, USA, 2009. ACM.
[18]
}}M. Xue, P. Kalnis, and H. K. Pung. Location diversity: Enhanced privacy protection in location based services. In LoCA '09: Proceedings of the 4th International Symposium on Location and Context Awareness, pages 70--87, Berlin, Heidelberg, 2009. Springer-Verlag.

Cited By

View all
  • (2024)Inter-regional Lens on the Privacy Preferences of Drivers for ITS and Future VANETsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3641997(1-20)Online publication date: 11-May-2024
  • (2023)Attribute-Based Location Sharing for Cloud Computing EnvironmentsSSRN Electronic Journal10.2139/ssrn.4532163Online publication date: 2023
  • (2023)What is Your Location Privacy Worth? Monetary Valuation of Different Location Types and Privacy Influencing FactorsProceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3558482.3590180(19-29)Online publication date: 29-May-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
UbiComp '10: Proceedings of the 12th ACM international conference on Ubiquitous computing
September 2010
366 pages
ISBN:9781605588438
DOI:10.1145/1864349
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

  • University of Florida: University of Florida

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 September 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. location sharing technology
  2. mobile social technology
  3. privacy

Qualifiers

  • Research-article

Conference

Ubicomp '10
Ubicomp '10: The 2010 ACM Conference on Ubiquitous Computing
September 26 - 29, 2010
Copenhagen, Denmark

Acceptance Rates

UbiComp '10 Paper Acceptance Rate 39 of 202 submissions, 19%;
Overall Acceptance Rate 764 of 2,912 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)35
  • Downloads (Last 6 weeks)1
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Inter-regional Lens on the Privacy Preferences of Drivers for ITS and Future VANETsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3641997(1-20)Online publication date: 11-May-2024
  • (2023)Attribute-Based Location Sharing for Cloud Computing EnvironmentsSSRN Electronic Journal10.2139/ssrn.4532163Online publication date: 2023
  • (2023)What is Your Location Privacy Worth? Monetary Valuation of Different Location Types and Privacy Influencing FactorsProceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3558482.3590180(19-29)Online publication date: 29-May-2023
  • (2023)Linking location privacy, digital sovereignty and location-based services: a meta reviewJournal of Location Based Services10.1080/17489725.2023.223918018:1(1-52)Online publication date: 7-Aug-2023
  • (2023)What is Your Information Worth? A Systematic Analysis of the Endowment Effect of Different Data TypesSecure IT Systems10.1007/978-3-031-47748-5_13(223-242)Online publication date: 8-Nov-2023
  • (2022)Privacy Theories and FrameworksModern Socio-Technical Perspectives on Privacy10.1007/978-3-030-82786-1_2(15-41)Online publication date: 9-Feb-2022
  • (2021)Local News and Geolocation Technology in the Case of PortugalPublications10.3390/publications90400539:4(53)Online publication date: 11-Nov-2021
  • (2021)The Effectiveness of Adaptation Methods in Improving User Engagement and Privacy Protection on Social Network SitesProceedings on Privacy Enhancing Technologies10.2478/popets-2022-00312022:1(629-648)Online publication date: 20-Nov-2021
  • (2021)Location-sharing protocol for privacy protection in mobile online social networksEURASIP Journal on Wireless Communications and Networking10.1186/s13638-021-01999-z2021:1Online publication date: 17-May-2021
  • (2021)Truth or Dare: Understanding and Predicting How Users Lie and Provide Untruthful Data OnlineProceedings of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411764.3445625(1-15)Online publication date: 6-May-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media