skip to main content
10.1145/1357054.1357133acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Accountabilities of presence: reframing location-based systems

Published:06 April 2008Publication History

ABSTRACT

How do mobility and presence feature as aspects of social life? Using a case study of paroled offenders tracked via Global Positioning System (GPS), we explore the ways that location-based technologies frame people's everyday experiences of space. In particular, we focus on how access and presence are negotiated outside of traditional conceptions of "privacy." We introduce the notion of accountabilities of presence and suggest that it is a more useful concept than "privacy" for understanding the relationship between presence and sociality.

References

  1. Barkhuus, L., Chalmers, M., Tennent, P., Hall, M., Bell, M, Sherwood, S., and Brown, B. 2005. Picking Pockets on the Lawn: The Development of Tactics and Strategies in a Mobile Game. Proc. Intl. Conf. Ubiquitous Computing Ubicomp 2005 (Tokyo, Japan), 358--374. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Bell, M., Chalmers, M., Barkhuus, L., Hall, M., Sherwood, S., Tennent, P., Brown, B., Rowland, D., and Benford, S. 2006. Interweaving mobile games with everyday life. Proc. ACM Conf. Human Factors in Computing Systems (Montréal, Québec,). CHI '06. ACM Press, New York, NY, 417--426. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Benford, S., Crabtree, A., Flintham, M., Drozd, A., Anastasi, R., Paxton, M., Tandavanitj, N., Adams, M., and Row-Farr, J. 2006. Can you see me now?. ACM Trans. Comput.-Hum. Interact. 13(1), 100-133. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Dourish, P. 2006. Re-Spaceing Place: Place and Space Ten Years On. Proc. ACM Conf. Computer-Supported Cooperative Work CSCW 2006 (Banff, Alberta), 299--308. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Dourish, P. and Anderson, K. 2006. Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena. Human-Computer Interaction, 21(3), 319--342 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Dourish, P. and Bell, G. 2007. The Infrastructure of Experience and the Experience of Infrastructure: Meaning and Structure in Everyday Encounters with Space. Environment and Planning B: Planning and Design, 34(3), 414--430.Google ScholarGoogle ScholarCross RefCross Ref
  7. Erickson, T. and Kellogg, W. A. 2000. Social translucence: an approach to designing systems that support social processes. ACM Trans. Comput.-Hum. Interact. 7(1), 59--83. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Esbjörnsson, M. and Weilenmann, A. 2005. Mobile Phone Talk in Context. Modeling and Using Context (LNCS 3554), 140--154. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Fabelo, T. 2000. 'Technocorrections:' The promises, the uncertain threats. Research in Brief, Sentencing & Corrections: Issues for the 21st Century, Washington, DC: U.S. Department of Justice, National Institute of Justice.Google ScholarGoogle Scholar
  10. Foucault, M. 1977. Discipline and Punish: The Birth of the Prison. London: Tavistock.Google ScholarGoogle Scholar
  11. Gandy, Jr., O.H. 1993. The Panoptic Sort: A Political Economy of Personal Information. Boulder, CO: Westview Press.Google ScholarGoogle Scholar
  12. Green, N. 2002. On the Move: Technology, Mobility, and the Mediation of Social Time and Space. The Information Society, 18, 281--292.Google ScholarGoogle ScholarCross RefCross Ref
  13. Harper, R. H. 1992. Looking at ourselves: an examination of the social organisation of two research laboratories. Proc. ACM Conf. Computer-Supported Cooperative Work CSCW '92 (Toronto, ON), 330--337. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Hartsock, N. 1983. The Feminist Standpoint: Developing the ground for a specifically feminist historical materialism. In Harding and Hintikka, eds. Discovering reality, 283--310.Google ScholarGoogle Scholar
  15. Hightower, J., Consolvo, S., LaMarca, A., Smith, I., and Hughes, J. 2005. Learning and Recognizing the Places We Go. Proc. Intl. Conf. Ubiquitous Computing (Ubicomp 2005), 159--176. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Hong, J., Boriello, G., Landay, J., McDonald, D., Schilit, B., and Tygar, J. 2003. Privacy and Security in the Location-Enhanced World Wide Web. Proc. Ubicomp 2003 (Seattle, WA). Springer.Google ScholarGoogle Scholar
  17. Iachello, G., Smith, I., Consolvo, S., Chen, M., and Abowd, G. 2005. Developing Privacy Guidelines for Social Location Disclosure Applications and Services. Proc. Symposium on Usable Privacy and Security SOUPS 2005 (Pittsburgh, PA), 65--76. New York: ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Idhe, D. 2002. Bodies in Technology. Minneapolis, MN: University of Minnesota Press.Google ScholarGoogle Scholar
  19. Lynch, K. 1960. The Image of the City. Cambridge, MA: MIT Press.Google ScholarGoogle Scholar
  20. Massey, D. 1993. Power-geometry and a Progressive Sense of Place. In Bird, Curtis, Putnam, Robertson and Tickner (eds), Mapping the Futures: Local Cultures, Global Change. London: Routledge.Google ScholarGoogle Scholar
  21. Munn, N. 1996. Excluded Spaces: The Figure in the Australian Aboriginal Landscape. Critical Inquiry, 22(3), 446--465.Google ScholarGoogle ScholarCross RefCross Ref
  22. Newman, W., Eldridge, M., and Lamming, M. 1991. Pepys: Generating Autobiographies by Automatic Tracking. Proc. European Conf. Computer-Supported Cooperative Work ECSCW'91 (Amsterdam, NL), 175--188. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Nieto, M. 2004. Community treatment and supervision of sex offenders: How it's done across the country and in California. Sacramento, CA: California Research Bureau.Google ScholarGoogle Scholar
  24. Poster, M. 1984. Foucault, Marxism, and History: Mode of Production versus Mode of Information. Cambridge: Polity Press.Google ScholarGoogle Scholar
  25. Poster, M. 1996. Databases as Discourse, or Electronic Interpellations. In David Lyon and Elia Zureik, eds., Computers, Surveillance, and Privacy. Minneapolis, MN: University of Minnesota Press.Google ScholarGoogle Scholar
  26. Scott, J. 1999. Seeing Like a State: How certain schemes to improve the human condition have failed. Yale University Press.Google ScholarGoogle Scholar
  27. Stoffle, R., Halmo, D., and Austin, D. 1997. Cultural Landscapes and Traditional Cultural Properties: A Southern Paiute View of the Grand Canyon and Colorado River. American Indian Quarterly, 21(2), 229--249.Google ScholarGoogle ScholarCross RefCross Ref
  28. Turnbull, D. 2005. Locating, Negotiating, and Crossing Boundaries: a Western Desert Land Claim, the Tordesillas Line, and the Western Australian Border. Environment and Planning D: Society and Space, 23, 575--570.Google ScholarGoogle ScholarCross RefCross Ref
  29. Verran, H. 1998. Reimagining Land Ownership in Australia. Postcolonial Studies, 1(2), 237--254.Google ScholarGoogle ScholarCross RefCross Ref
  30. Whitfield, D. 2001. The Magic Bracelet: Technology and Offender Supervision. Winchester, UK: Waterside Press.Google ScholarGoogle Scholar
  31. Winner, L. 1980. Do Artefacts have Politics? Daedalus, 109(1), 121--136.Google ScholarGoogle Scholar
  32. Woolgar, S. and Cooper, G. 1999. Do Artifacts have Abivalence? Moses' Bridges, Winner's Bridges, and other Urban Legends in S&TS. Social Studies of Science, 29(3), 433--449.Google ScholarGoogle ScholarCross RefCross Ref
  33. Jacob Wetterling Crimes Against Children and Sexually Violent Offender Registration Act, 42 U.S.C. § 14071, 1994.Google ScholarGoogle Scholar
  34. Child Protection and Safety Sex Offender Registration and Notification, Megan Nicole Kanka and Alexandra Nicole Zapp Community Notification Program, 42 U.S.C.S. § 16921, 1996.Google ScholarGoogle Scholar
  35. California Assembly Bill 488, Chapter 745. Megan's Law: An Act to add Section 290.46, Cal Penal Code § 290, 2004.Google ScholarGoogle Scholar
  36. The Florida Sexual Predators Act: Jessica Lunsford Act, Fla. St. § 775.21, 2005Google ScholarGoogle Scholar
  37. The California Sexual Predator Punishment and Control Act: Jessica's Law, CA Prop 83, Approved by voters, General Election, November 7, 2006. Amendment to Cal Penal Code § 288, 2006.Google ScholarGoogle Scholar

Index Terms

  1. Accountabilities of presence: reframing location-based systems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '08: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
      April 2008
      1870 pages
      ISBN:9781605580111
      DOI:10.1145/1357054

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 6 April 2008

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CHI '08 Paper Acceptance Rate157of714submissions,22%Overall Acceptance Rate6,199of26,314submissions,24%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader