ABSTRACT
Feedback is viewed as an essential element of ubiquitous computing systems in the HCI literature for helping people manage their privacy. However, the success of online social networks and existing commercial systems for mobile location sharing which do not incorporate feedback would seem to call the importance of feedback into question. We investigated this issue in the context of a mobile location sharing system. Specifically, we report on the findings of a field de-ployment of Locyoution, a mobile location sharing system. In our study of 56 users, one group was given feedback in the form of a history of location requests, and a second group was given no feedback at all. Our major contribution has been to show that feedback is an important contributing factor towards improving user comfort levels and allaying privacy concerns. Participants' privacy concerns were reduced after using the mobile location sharing system. Additionally,our study suggests that peer opinion and technical savviness contribute most to whether or not participants thought they would continue to use a mobile location technology.
- D. Anthony, D. Kotz, and T. Henderson. Privacy in location-aware computing environments. IEEE Pervasive Computing, 6(4):64--72, 2007. Google ScholarDigital Library
- L. Barkhuus, B. Brown, M. Bell, M. Hall, S. Sherwood, and M. Chalmers. From awareness to repartee: Sharing location within social groups. In CHI '08, pages 497--506, April 2008. Google ScholarDigital Library
- L. Barkhuus and A. Dey. Location-based services for mobile telephony: a study of users' privacy concerns. In INTERACT'03, pages 702--712, 2003.Google Scholar
- V. Bellotti and A. Sellen. Design for privacy in ubiquitous computing environments. In ECSCW '93, 1993. Google ScholarDigital Library
- B. Brown, A. Taylor, S. Izadi, A. Sellen, J. Kaye, and R. Eardley. Location family values: A field trial of the whereabouts clock. In Ubiquitous Computing (Ubicomp '07), pages 354--371. Springer-Verlag, 2007. Google ScholarDigital Library
- B. Charny. New cell feature helps find friends, July 25 2002. http://www.news.com/2100-1033-946224.html.Google Scholar
- S. Consolovo, I. Smith, T. Matthews, A. LaMarca, J. Tabert, and P. Powledge. Location disclosure to social relations: Why, when,&what people want to share. In CHI '05, 2005. Google ScholarDigital Library
- J. Cornwell, I. Fette, G. Hsieh, M. Prabaker, J. Rao, K. Tang, K. Vaniea, L. Bauer, L. Cranor, J. Hong, B. McLaren, M. Reiter, and N. Sadeh. User-controllable security and privacy for pervasive computing. In IEEE Workshop on Mobile Computing Systems and Applications (HotMobile '07), 2007. Google ScholarDigital Library
- F. Davis, R. Bagozzi, and P. Warshaw. Extrinsic and intrinsic motivation to use computers in the workplace. Journal of Applied Social Psychology, 22:1111 -- 1132, 1992.Google Scholar
- T. Erickson and W. A. Kellogg. Social translucence: an approach to designing systems that support social processes. ACM Trans. Comput.-Hum. Interact., 7(1):59--83, 2000. Google ScholarDigital Library
- J. Hightower, A. LaMarca, and I. E. Smith. Practical lessons from place lab. IEEE Pervasive Computing, 5(3):32--39, 2006. Google ScholarDigital Library
- L. Holson. Privacy lost: These phones can find you. New York Times, October 23 2007. http://www.nytimes.com/2007/10/23/technology/23mobile.html.Google Scholar
- G. Hsieh, K. Tang, W. Low, and J. Hong. Field deployment of IMbuddy : A study of privacy control and feedback mechanisms for contextual IM. In Ubiquitous Computing (Ubicomp '07), pages 91--108, 2007. Google ScholarDigital Library
- S. Huang, F. Proulx, and C. Ratti. iFIND: a Peer-to-Peer application for real-time location monitoring on the MIT campus. In CUPUM 07 - 10th International Conference on Computers in Urban Planning and Urban Management, July 11-13 2007.Google Scholar
- G. Iachello and J. Hong. End-user privacy in human-computer interaction. Found. Trends Hum.-Comput. Interact., 1(1):1--137, 2007. Google ScholarDigital Library
- G. Iachello, I. Smith, S. Consolovo, G. Abowd, J. Hughes, J. Howard, F. Potter, J. Scott, T. Sohn, J. Hightower, and A. LaMarca. Control, deception, and communication: Evaluating the deployment of a location-enhanced messaging service. In UbiComp 2005, pages 213 -- 231. Springer-Verlag, 2005. Google ScholarDigital Library
- G. Iachello, I. Smith, S. Consolovo, M. Chen, and G. Abowd. Developing privacy guidelines for social location disclosure applications and services. In SOUPS '05, 2005. Google ScholarDigital Library
- I. Junglas and R. Watson. Location-based services. Communications of The ACM, 51(3):65--69, March 2008. 19. A. Khalil and K. Connelly. Context-aware telephony: Privacy preferences and sharing patterns. In CSCW '06, 2006. Google ScholarDigital Library
- S. Lederer, J. Mankoff, and A. K. Dey. Who wants to know what when? privacy preference determinants in ubiquitous computing. In CHI '03, number 724--725, 2003. Google ScholarDigital Library
- C. McCarthy. The mobile social: Not ready for prime time?, February 13 2008. http://www.news.com/8301-13577_3-9870611-36.html.Google Scholar
- A. G. Miklas, K. K. Gollu, K. K. W. Chan, S. Saroiu, K. P. Gummadi, and E. de Lara. Exploiting social interactions in mobile systems. In UbiComp 2007, volume 4717/2007, pages 409--428, 2007. Google ScholarDigital Library
- S. Patil and J. Lai. Who gets to know what when: Configuring privacy permissions in an awareness application. In CHI '05, pages 101 -- 110, 2005. Google ScholarDigital Library
- M. Raento, A. Oulasvirta, R. Petit, and H. Toivonen. Contextphone: A prototyping platform for context-aware mobile applications. In Pervasive '05, pages 51 -- 59, 2005. Google ScholarDigital Library
- N. Sadeh, F. Gandon, and O. B. Kwon. Ambient intelligence: The myCampus experience. Technical Report CMU-ISRI-05-123, Carnegie Mellon University, July 2005.Google ScholarCross Ref
- N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley, M. Prabaker, and J. Rao. Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing, Forthcoming 2008. Google ScholarDigital Library
- I. Smith, S. Consolovo, A. LaMarca, J. Hightower, J. Scott, T. Sohn, J. Hughes, G. Iachello, and G. Abowd. Social disclosure of place: From location technology to communication practices. In Pervasive '05, pages 134 -- 151. Springer-Verlag, 2005. Google ScholarDigital Library
- S. Spiekermann. User Control in Ubiquitous Computer: Design Alternatives and User Acceptance. Shaker Verlag, 2008.Google Scholar
- S. Stumpf, V. Rajaram, L. Li, M. Burnett, T. Dietterich, E. Sullivan, R. Drummond, and J. Herlocker. Toward harnessing user feedback for machine learning. In IUI '07: Proceedings of the 12th international conference on Intelligent user interfaces, pages 82--91, New York, NY, USA, 2007. ACM. Google ScholarDigital Library
- R. Want, V. Falcao, and J. Gibbons. The active badge location system. ACM Transactions on Information Systems, 10:91--102, 1992. Google ScholarDigital Library
Index Terms
- Who's viewed you?: the impact of feedback in a mobile location-sharing application
Recommendations
Context-aware telephony: privacy preferences and sharing patterns
CSCW '06: Proceedings of the 2006 20th anniversary conference on Computer supported cooperative workThe proliferation of cell phones has led to an ever increasing number of inappropriate interruptions. Context-aware telephony applications, in which callers are provided with context information about the receivers, has been proposed as a solution for ...
Studying Preferences and Concerns about Information Disclosure in Email Notifications
WWW '19: The World Wide Web ConferencePeople receive dozens, or hundreds, of notifications per day and each notification poses some risk of accidental information disclosure in the presence of others; onlookers may see notifications on a mobile phone lock screen, on the periphery of a ...
Preventing sensitive relationships disclosure for better social media preservation
A fundamental aspect of all social networks is information sharing. It is one of the most common forms of online interaction that is tightly associated with social media preservation and information disclosure. As such, information sharing is commonly ...
Comments