skip to main content
10.1145/1518701.1519005acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Who's viewed you?: the impact of feedback in a mobile location-sharing application

Published:04 April 2009Publication History

ABSTRACT

Feedback is viewed as an essential element of ubiquitous computing systems in the HCI literature for helping people manage their privacy. However, the success of online social networks and existing commercial systems for mobile location sharing which do not incorporate feedback would seem to call the importance of feedback into question. We investigated this issue in the context of a mobile location sharing system. Specifically, we report on the findings of a field de-ployment of Locyoution, a mobile location sharing system. In our study of 56 users, one group was given feedback in the form of a history of location requests, and a second group was given no feedback at all. Our major contribution has been to show that feedback is an important contributing factor towards improving user comfort levels and allaying privacy concerns. Participants' privacy concerns were reduced after using the mobile location sharing system. Additionally,our study suggests that peer opinion and technical savviness contribute most to whether or not participants thought they would continue to use a mobile location technology.

References

  1. D. Anthony, D. Kotz, and T. Henderson. Privacy in location-aware computing environments. IEEE Pervasive Computing, 6(4):64--72, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. L. Barkhuus, B. Brown, M. Bell, M. Hall, S. Sherwood, and M. Chalmers. From awareness to repartee: Sharing location within social groups. In CHI '08, pages 497--506, April 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. L. Barkhuus and A. Dey. Location-based services for mobile telephony: a study of users' privacy concerns. In INTERACT'03, pages 702--712, 2003.Google ScholarGoogle Scholar
  4. V. Bellotti and A. Sellen. Design for privacy in ubiquitous computing environments. In ECSCW '93, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. B. Brown, A. Taylor, S. Izadi, A. Sellen, J. Kaye, and R. Eardley. Location family values: A field trial of the whereabouts clock. In Ubiquitous Computing (Ubicomp '07), pages 354--371. Springer-Verlag, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. B. Charny. New cell feature helps find friends, July 25 2002. http://www.news.com/2100-1033-946224.html.Google ScholarGoogle Scholar
  7. S. Consolovo, I. Smith, T. Matthews, A. LaMarca, J. Tabert, and P. Powledge. Location disclosure to social relations: Why, when,&what people want to share. In CHI '05, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Cornwell, I. Fette, G. Hsieh, M. Prabaker, J. Rao, K. Tang, K. Vaniea, L. Bauer, L. Cranor, J. Hong, B. McLaren, M. Reiter, and N. Sadeh. User-controllable security and privacy for pervasive computing. In IEEE Workshop on Mobile Computing Systems and Applications (HotMobile '07), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. F. Davis, R. Bagozzi, and P. Warshaw. Extrinsic and intrinsic motivation to use computers in the workplace. Journal of Applied Social Psychology, 22:1111 -- 1132, 1992.Google ScholarGoogle Scholar
  10. T. Erickson and W. A. Kellogg. Social translucence: an approach to designing systems that support social processes. ACM Trans. Comput.-Hum. Interact., 7(1):59--83, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Hightower, A. LaMarca, and I. E. Smith. Practical lessons from place lab. IEEE Pervasive Computing, 5(3):32--39, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. L. Holson. Privacy lost: These phones can find you. New York Times, October 23 2007. http://www.nytimes.com/2007/10/23/technology/23mobile.html.Google ScholarGoogle Scholar
  13. G. Hsieh, K. Tang, W. Low, and J. Hong. Field deployment of IMbuddy : A study of privacy control and feedback mechanisms for contextual IM. In Ubiquitous Computing (Ubicomp '07), pages 91--108, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. S. Huang, F. Proulx, and C. Ratti. iFIND: a Peer-to-Peer application for real-time location monitoring on the MIT campus. In CUPUM 07 - 10th International Conference on Computers in Urban Planning and Urban Management, July 11-13 2007.Google ScholarGoogle Scholar
  15. G. Iachello and J. Hong. End-user privacy in human-computer interaction. Found. Trends Hum.-Comput. Interact., 1(1):1--137, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. G. Iachello, I. Smith, S. Consolovo, G. Abowd, J. Hughes, J. Howard, F. Potter, J. Scott, T. Sohn, J. Hightower, and A. LaMarca. Control, deception, and communication: Evaluating the deployment of a location-enhanced messaging service. In UbiComp 2005, pages 213 -- 231. Springer-Verlag, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. G. Iachello, I. Smith, S. Consolovo, M. Chen, and G. Abowd. Developing privacy guidelines for social location disclosure applications and services. In SOUPS '05, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. I. Junglas and R. Watson. Location-based services. Communications of The ACM, 51(3):65--69, March 2008. 19. A. Khalil and K. Connelly. Context-aware telephony: Privacy preferences and sharing patterns. In CSCW '06, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. Lederer, J. Mankoff, and A. K. Dey. Who wants to know what when? privacy preference determinants in ubiquitous computing. In CHI '03, number 724--725, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. C. McCarthy. The mobile social: Not ready for prime time?, February 13 2008. http://www.news.com/8301-13577_3-9870611-36.html.Google ScholarGoogle Scholar
  21. A. G. Miklas, K. K. Gollu, K. K. W. Chan, S. Saroiu, K. P. Gummadi, and E. de Lara. Exploiting social interactions in mobile systems. In UbiComp 2007, volume 4717/2007, pages 409--428, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. S. Patil and J. Lai. Who gets to know what when: Configuring privacy permissions in an awareness application. In CHI '05, pages 101 -- 110, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. M. Raento, A. Oulasvirta, R. Petit, and H. Toivonen. Contextphone: A prototyping platform for context-aware mobile applications. In Pervasive '05, pages 51 -- 59, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. N. Sadeh, F. Gandon, and O. B. Kwon. Ambient intelligence: The myCampus experience. Technical Report CMU-ISRI-05-123, Carnegie Mellon University, July 2005.Google ScholarGoogle ScholarCross RefCross Ref
  25. N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley, M. Prabaker, and J. Rao. Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing, Forthcoming 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. I. Smith, S. Consolovo, A. LaMarca, J. Hightower, J. Scott, T. Sohn, J. Hughes, G. Iachello, and G. Abowd. Social disclosure of place: From location technology to communication practices. In Pervasive '05, pages 134 -- 151. Springer-Verlag, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. S. Spiekermann. User Control in Ubiquitous Computer: Design Alternatives and User Acceptance. Shaker Verlag, 2008.Google ScholarGoogle Scholar
  28. S. Stumpf, V. Rajaram, L. Li, M. Burnett, T. Dietterich, E. Sullivan, R. Drummond, and J. Herlocker. Toward harnessing user feedback for machine learning. In IUI '07: Proceedings of the 12th international conference on Intelligent user interfaces, pages 82--91, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. R. Want, V. Falcao, and J. Gibbons. The active badge location system. ACM Transactions on Information Systems, 10:91--102, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Who's viewed you?: the impact of feedback in a mobile location-sharing application

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            CHI '09: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
            April 2009
            2426 pages
            ISBN:9781605582467
            DOI:10.1145/1518701

            Copyright © 2009 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 4 April 2009

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            CHI '09 Paper Acceptance Rate277of1,130submissions,25%Overall Acceptance Rate6,199of26,314submissions,24%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader