Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2675133.2675179acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article

Do Birds of a Feather Watch Each Other?: Homophily and Social Surveillance in Location Based Social Networks

Published: 28 February 2015 Publication History

Abstract

Location sharing applications (LSA) have proliferated in recent years. Current research principally focuses on egocentric privacy issues and design but has historically not explored the impact of surveillance on location sharing behavior. In this paper, we examine homophily in friendship and surveillance networks for 65 foursquare users. Our results indicate that location surveillance networks are strongly homophilous along the lines of race and gender while friendship networks are weakly homophilous on income. Qualitatively, an analysis of comments and interviews provides support for a discourse around location surveillance, which is mainly social, collaborative, positive and participatory. We relate these findings with prior literature on surveillance, self-presentation and homophily and situate this study in existing HCI/CSCW scholarship.

References

[1]
Albrechtslund, A. Online social networking as participatory surveillance. First Monday,13, 3 (2008).
[2]
Andrejevic, M. The discipline of watching: Detection, risk, and lateral surveillance. Critical Studies in Media Communication, 23,5 (2006), 391--407.
[3]
Backstrom, L., Huttenlocher, D., Kleinberg, J., & Lan, X. Group formation in large social networks: membership, growth, and evolution. In Proc. SIGKDD (2006). 44--54.
[4]
Barkhuus, L., Brown, B., Bell, M., Sherwood, S., Hall, M., & Chalmers, M. From awareness to repartee: sharing location within social groups. In Proc. CHI (2008), 497506.
[5]
Barkhuus, L.The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI. In Proc. CHI (2012), 367--376.
[6]
Benisch, M., Kelley, P. G., Sadeh, N., & Cranor, L. F. Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs. PUC, 15,7 (2011), 679--694.
[7]
Boesen, J., Rode, J. A., & Mancini, C. The domestic panopticon: location tracking in families. In Proc. Ubicomp (2010), 65--74.
[8]
Brush, A. J., Krumm, J., & Scott, J. Exploring end user preferences for location obfuscation, location-based services, and the value of location. In Proc. Ubicomp (2010), 95--104.
[9]
Brown, B., Taylor, A. S., Izadi, S., Sellen, A., Jofish-Kaye, J., & Eardley, R. Locating family values: A field trial of the Whereabouts Clock. In Ubicomp (2007), 354--371.
[10]
Consolvo, S., Smith, I. E., Matthews, T., LaMarca, A., Tabert, J., & Powledge, P. Location disclosure to social relations: why, when, & what people want to share. In Proc. CHI (2005), 81--90.
[11]
Cramer, H., Rost, M., & Holmquist, L. E. Performing a check-in: emerging practices, norms and 'conflicts' in location-sharing using foursquare. In Proc. Mobile HCI (2011), 57--66.
[12]
Dourish, P.Implications for design. In Proc. CHI (2006), 541--550.
[13]
e Silva, A. D. S., & Frith, J. Mobile interfaces in public spaces: Locational privacy, control, and urban sociability. Taylor & Francis, 2012.
[14]
foursquare. URL: https://foursquare.com/about/
[15]
foursquare platform feature descriptions. URL: https://support.foursquare.com/hc/en-us
[16]
Glaser, B., & Strauss, A. The discovery of grounded theory. Weidenfield & Nicolson, London, 1967.
[17]
Guha, S., & Birnholtz, J. Can you see me now?: location, visibility and the management of impressions on foursquare. In Proc. Mobile HCI (2013), 183--192.
[18]
Hanneman, R. A., and Riddle, M.Introduction to social network methods. University of California, Riverside, 2005.
[19]
Humphreys, L. Mobile social networks and social practice: A case study of Dodgeball. JCMC, 13, 1 (2007), 341--360.
[20]
Humphreys, L. Mobile social networks and urban public space. New Media & Society, 12, 5 (2010), 763--778.
[21]
Humphreys, L. Who's watching whom? A study of interactive technology and surveillance. Journal of Communication, 61, 4 (2011), 575--595.
[22]
Iachello, G., Smith, I., Consolvo, S., Chen, M., & Abowd, G. D.Developing privacy guidelines for social location disclosure applications and services. In Proc. SOUPS (2005), 65--76.
[23]
Iachello, G., & Hong, J. End-user privacy in humancomputer interaction. Foundations and Trends in HumanComputer Interaction, 1, 1 (2007), 1--137.
[24]
Lewis, K., Gonzalez, M., & Kaufman, J. Social selection and peer influence in an online social network. Proceedings of the National Academy of Sciences, 109, 1 (2012), 68--72.
[25]
Lindqvist, J., Cranshaw, J., Wiese, J., Hong, J., & Zimmerman, J. I'm the mayor of my house: examining why people use foursquare-a social-driven location sharing application. In Proc. CHI (2011). 2409--2418.
[26]
Lingel, J., & Naaman, M. 2014. City, self, network: transnational migrants and online identity work. In Proc. CSCW (2014), 1502--1510.
[27]
Lyon, D. Surveillance Studies: An Overview. Polity Press, Cambridge, 2007.
[28]
Marwick, A. E. The Public Domain: Social Surveillance in Everyday Life. Surveillance & Society, 9, 4 (2012).
[29]
McCorkel, J. A. Embodied surveillance and the gendering of punishment. Journal of Contemporary Ethnography, 32, 1 (2003), 41--76.
[30]
McPherson, M., Smith-Lovin, L., & Cook, J. M. Birds of a feather: Homophily in social networks. Annual Review of Sociology, 27 (2001), 415--444.
[31]
Nissenbaum, H. Privacy as contextual integrity. Wash. L. Rev., 79, (2004) 119.
[32]
Opsahl, T. Structure and Evolution of Weighted Networks. University of London (Queen Mary College), London, UK, (2009), 104--122. URL: http://toreopsahl.com/tnet/
[33]
Pavlovskaya, M., & Martin, K. S. Feminism and geographic information systems: From a missing object to a mapping subject. Geography Compass, 1, 3 (2007), 583--606.
[34]
Page, X., Knijnenburg, B. P., & Kobsa, A.What a tangled web we weave: lying backfires in location-sharing social media. In Proc. CSCW (2013), 273--284.
[35]
Patil, S., Norcie, G., Kapadia, A., & Lee, A. J. Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice. In Proc. SOUPS (2012), 5.
[36]
Patil, S., Schlegel, R., Kapadia, A., & Lee, A. J. Reflection or action?: how feedback and control affect location sharing decisions. In Proc. CHI (2014), 101--110.
[37]
Reilly, D., Dearman, D., Ha, V., Smith, I., & Inkpen, K. "Need to know": examining information need in location discourse. Pervasive Computing, (2006), 33--49.
[38]
Shalizi, C. R., & Thomas, A. C. Homophily and contagion are generically confounded in observational social network studies. Soc. Methods & Research, 40, 2 (2011), 211--239.
[39]
Smith, I.Consolvo, S., Lamarca, A., Hightower, J., Scott, J., Sohn, T.,Hughes,J,Iachello,G and Abowd, G. D. Social disclosure of place: From location technology to communication practices. Pervasive Computing, (2005), 134--151.
[40]
Stuart, H. C., Dabbish, L., Kiesler, S., Kinnaird, P., & Kang, R. Social transparency in networked information exchange: a theoretical framework. In Proc. CSCW (2012), 451--460.
[41]
Tang, K. P., Lin, J., Hong, J. I., Siewiorek, D. P., & Sadeh, N. Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing. In Proc. Ubicomp (2010), 85--94.
[42]
Tang, K., Hong, J., & Siewiorek, D. The implications of offering more disclosure choices for social location sharing. In Proc. CHI (2012), 391--394.
[43]
Toch, E., Cranshaw, J., Hankes-Drielsma, P., Springfield, J., Kelley, P. G., Cranor, L.,Hong,J. and Sadeh, N. Locaccino: a privacy-centric location sharing application. In Proc. Ubicomp-Adjunct (2010), 381--382.
[44]
Trottier, D. Interpersonal surveillance on social media. Canadian Journal of Communication, 37, 2 (2012).
[45]
Tsai, J. Y., Kelley, P., Drielsma, P., Cranor, L. F., Hong, J., & Sadeh, N. Who's viewed you?: the impact of feedback in a mobile location-sharing application.In Proc. CHI (2009),2003--2012.
[46]
Want, R., Hopper, A., Falcao, V., & Gibbons, J. The active badge location system. ACM Transactions on Information Systems, 10, 1 (1992), 91--102.
[47]
Wicker, S. B. Cellular Convergence and the Death of Privacy. Oxford University Press, 2013.
[48]
Wiese, J., Kelley, P. G., Cranor, L. F., Dabbish, L., Hong, J. I., & Zimmerman, J. Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share. In Proc. Ubicomp (2011), 197--206.
[49]
Wilson, S., Cranshaw, J., Sadeh, N., Acquisti, A., Cranor, L. F., Springfield, J.,Jeong, S.Y. and Balasubramanian, A. Privacy manipulation and acclimation in a location sharing application. In Proc. Ubicomp (2013). 549--558.
[50]
Yuan, Y. C. and Gay, G. Homophily of Network Ties and Bonding and Bridging Social Capital in ComputerMediated Distributed Teams. JCMC, 11, 4 (2006), 1062--1084.

Cited By

View all
  • (2024)Not Just A Dot on The Map: Food Delivery Workers as InfrastructureProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3641918(1-15)Online publication date: 11-May-2024
  • (2024)Completion of irregular emotion sequence based on users' social relationships and historical emotionsInternational Journal of Parallel, Emergent and Distributed Systems10.1080/17445760.2024.2350688(1-19)Online publication date: 21-May-2024
  • (2023)GWNN-HF: beyond assortativity in graph wavelet neural networkKnowledge and Information Systems10.1007/s10115-023-01900-y65:11(5005-5024)Online publication date: 9-Jun-2023
  • Show More Cited By

Index Terms

  1. Do Birds of a Feather Watch Each Other?: Homophily and Social Surveillance in Location Based Social Networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CSCW '15: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing
    February 2015
    1956 pages
    ISBN:9781450329224
    DOI:10.1145/2675133
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 February 2015

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. foursquare
    2. homophily
    3. privacy
    4. surveillance
    5. visibility
    6. vision

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CSCW '15
    Sponsor:

    Acceptance Rates

    CSCW '15 Paper Acceptance Rate 161 of 575 submissions, 28%;
    Overall Acceptance Rate 2,235 of 8,521 submissions, 26%

    Upcoming Conference

    CSCW '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)52
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 08 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Not Just A Dot on The Map: Food Delivery Workers as InfrastructureProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3641918(1-15)Online publication date: 11-May-2024
    • (2024)Completion of irregular emotion sequence based on users' social relationships and historical emotionsInternational Journal of Parallel, Emergent and Distributed Systems10.1080/17445760.2024.2350688(1-19)Online publication date: 21-May-2024
    • (2023)GWNN-HF: beyond assortativity in graph wavelet neural networkKnowledge and Information Systems10.1007/s10115-023-01900-y65:11(5005-5024)Online publication date: 9-Jun-2023
    • (2020)Understanding the Challenges for Bangladeshi Women to Participate in #MeToo MovementProceedings of the ACM on Human-Computer Interaction10.1145/33751954:GROUP(1-25)Online publication date: 4-Jan-2020
    • (2020)Do My Emotions Influence What I Share? Analysing the Effects of Emotions on Privacy Leakage in Twitter2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom50675.2020.00165(1228-1235)Online publication date: Dec-2020
    • (2019)How Do People Change Their Technology Use in Protest?Proceedings of the ACM on Human-Computer Interaction10.1145/33591893:CSCW(1-22)Online publication date: 7-Nov-2019
    • (2019)Online sexual harassment over anonymous social media in BangladeshProceedings of the Tenth International Conference on Information and Communication Technologies and Development10.1145/3287098.3287107(1-12)Online publication date: 4-Jan-2019
    • (2019)When social intrusiveness depletes customer value: A balanced perspective on the agency of simultaneous sharers in a commercial sharing experiencePsychology & Marketing10.1002/mar.2125836:11(1082-1097)Online publication date: 10-Sep-2019
    • (2018)Safety vs. SurveillanceProceedings of the 2018 CHI Conference on Human Factors in Computing Systems10.1145/3173574.3173698(1-14)Online publication date: 21-Apr-2018
    • (2018)Regrets, I've Had a FewProceedings of the 2018 ACM International Conference on Supporting Group Work10.1145/3148330.3148338(166-177)Online publication date: 7-Jan-2018
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media