skip to main content
10.1145/1620545.1620547acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

From spaces to places: emerging contexts in mobile privacy

Published:30 September 2009Publication History

ABSTRACT

Mobile privacy concerns are central to Ubicomp and yet remain poorly understood. We advocate a diversified approach, enabling the cross-interpretation of data from complementary methods. However, mobility imposes a number of limitations on the methods that can be effectively employed. We discuss how we addressed this problem in an empirical study of mobile social networking. We report on how, by combining a variation of experience sampling and contextual interviews, we have started focusing on a notion of context in relation to privacy, which is subjectively defined by emerging socio-cultural knowledge, functions, relations and rules. With reference to Gieryn's sociological work, we call this place, as opposed to a notion of context that is objectively defined by physical and factual elements, which we call space. We propose that the former better describes the context for mobile privacy.

References

  1. Barkhuus, L. and Dey, A. Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns. Proc. INTERACT 2003. ACM Press (2003).Google ScholarGoogle Scholar
  2. Consolvo, S., Smith, I.E., Matthews, T., Lamarca, A. Tabert, J., Powledge, P. Location Disclosure to Social Relations: Why, When And What People Want to Share. Proc. SIGCHI Human Factors in Computing Systems. ACM press (2005), 81--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Khalil, A. and Connelly, K. Context-Aware Telephony: Privacy Preferences and Sharing Patterns. Proc. CSCW 2006. ACM Press (2006), 469--478. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Price, B.A., Adam, K. and Nuseibeh, B. Keeping Ubiquitous Computing to Yourself: A Practical Model for User Control of Privacy. International Journal of Human-Computer Studies (2005). 63(1-2), 228--253. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M. and Rao J. Understanding and Capturing People's Privacy Policies in Mobile Social Networking Application. Journal of Personal and Ubiquitous Computing (2008). 13(6), 401--412. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. http://www.usatoday.com/tech/science/2008-09-21-big-brother-restaurant_N.htm?csp=34.Google ScholarGoogle Scholar
  7. Smith, H., Fitzpatrick, G., and Rogers., Y. Eliciting Reactive and Reflective Feedback for a Social Communication Tool: A Multi-Session Approach. Proc. DIS 2004. ACM Press (2004), 39--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Rogers, Y., et al., Why It's Worth the Hassle: The Value of In-Situ Studies When Designing Ubicomp. UbiComp 2007: Ubiquitous Computing. Springer (2007), 336--353. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Antón, A.I., Bertino, E., Li, N., Yu, T. A Roadmap for Comprehensive Online Privacy Policy Management. Commun. ACM (2007), 50(7), 109--116. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Consolvo, S. and Walker, M. Using the Experience Sampling Method to Evaluate Ubicomp Applications. Pervasive Computing, IEEE (2003), 2(2), 24--31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. O'Brien, J. Rodeen, T. Rouncefield, M., Hughes, J. At Home with the Technology: an Ethnographic Study of a Set-Top-Box Trial. ACM Transactions on Computer-Human Interaction. (1999), 6(3), 282--308. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Kindberg, T., O'Neil, E., Bevan, C., Kostakos, V., Stanton Fraser, D., Jay, T. Measuring Trust in Wi-Fi Hotspots. Proc. SIGCHI Human Factors in Computing Systems. ACM Press (2008), 173--182. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Schilit, B., Adams, N., and Want, R. Context-Aware Computing Applications. Proc. Mobile Computing Systems and Applications (1994), 85--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Dey, A.K., Understanding and Using Context. Personal Ubiquitous Computing (2001), 5(1), 4--7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Ahern, S., Eckles, D., Good, N., King, S., Naaman, M., Nair, R. Over-Exposed? Privacy Patterns and Considerations in Online and Mobile Photo Sharing. Proc. SIGCHI Human Factors in Computing Systems. ACM Press (2007), 357--366. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. De Guzman, E.S., Sharmin, M., and Bailey, B.P. Should I Call Now? Understanding What Context Is Considered When Deciding Whether to Initiate Remote Communication Via Mobile Devices. Proc. Graphics Interface (2007), 143--150. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Iachello, G., Truong, K.N., Abowd, G.D., Hayes, G.R., Stevens, M. Prototyping and Sampling Experience to Evaluate Ubiquitous Computing Privacy in the Real World. Proc. SIGCHI Human Factors in Computing Systems. ACM Press (2006), 1009--1018. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Miner, A.G., Glomb, T.M., and Hulin, C.L. Mood at Work: Experience Sampling Using Palmtop Computers. Symposium Experience-Sampling Methods in Organisational Research, Society for Industrial and Organisational Psychology. (2001).Google ScholarGoogle Scholar
  19. Holtzblatt, K., Top Field Interviewing Mistakes: Recognizing and Preventing Them, CHI 2009 (2009).Google ScholarGoogle Scholar
  20. Proust, M., A La Recherche du Temps Perdu. Grasset&N.R.F. (1912--28).Google ScholarGoogle Scholar
  21. http://primma.open.ac.ukGoogle ScholarGoogle Scholar
  22. Mancini, C., Rogers, Y., Jedrzejczyk, L., Thomas, K., Price, B.A., Joinson, A. N., Bandara, A.K., Nuseibeh, B. A Multi-Pronged Empirical Approach to Mobile Privacy Investigation. Workshop Mobile User Experience Research: Challenges, Methods&Tools, CHI 2009 (2009).Google ScholarGoogle Scholar
  23. http://en.wikipedia.org/wiki/Facebook.Google ScholarGoogle Scholar
  24. Gross, R., Acquisti, A., and Heinz III, J.H. Information Revelation and Privacy in Online Social Networks. Proc. ACM Workshop Privacy in the Electronic Society. ACM Press (2005), 71--80. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Acquisti, A. and Gross, R. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. PET 2006. Springer (2006), 36--58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Joinson, A.N. Looking at, Looking Up or Keeping Up with People? Motives and Use of Facebook. Proc. SIGCHI Human Factors in Computing Systems. ACM Press (2008), 1027--1036. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Tsai, J.Y., Kelley, P., Drielsma, P., Cranor, L.F., Hong, J., Sadeh, N. Who's Viewed You? The Impact of Feedback in a Mobile Location-Sharing Application. Proc. SIGHCI Human Factors in Computing Systems. ACM Press (2009), 2003--2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Tolmie, P., Pycock, J., Diggins, T., MacLean, A., and Karsenty, A. Unremarkable Computing. Proc. SIGCHI Human Factors in Computing Systems. ACM Press (2002), 399--406. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Esbjörnsson, M. and Weilenmann, A. Mobile Phone Talk in Context. Dey, A., Turner, R., Kokinov, B., Leake, D. Modeling and Using Context. Springer (2005), 140--154. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Altman, I. The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding. Brooks/Cole Pub. Co (1975)Google ScholarGoogle Scholar
  31. Altman, I. Privacy Regulation: Culturally Universal or Culturally Specific? Journal of Social Issues (1977), 33(3), 66--84.Google ScholarGoogle ScholarCross RefCross Ref
  32. Dourish, P. What We Talk About When We Talk About Context? Personal Ubiquitous Computing (2004), 8(1), 19--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Tamminen, S., Oulasvirta, A., Toiskallio, K., Kankainen, A. Understanding mobile contexts. Personal Ubiquitous Computing (2004), 8(2), 135--143. Google ScholarGoogle ScholarCross RefCross Ref
  34. Gardies, A. L'Espace au Cinéma. Méridiens Klincksieck (1993).Google ScholarGoogle Scholar
  35. Harrison, S. and Dourish, P. Re-Place-Ing Space: the Roles of Place and Space in Collaborative Systems. Proc. CSCW 1996. ACM Press (1996), 67--76. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Dourish, P. Re-Space-Ing Place: "Place" and "Space" Ten Years On. Proc. CSCW 2006. ACM Press (2006), 299--308. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Gieryn, T.F. A Space for Place in Sociology. Annual Review of Sociology (2000), 26(1), 463--396.Google ScholarGoogle Scholar
  38. Rogers, Y. Moving on from Weiser's Vision of Calm Computing: Engaging UbiComp Experiences. Proc. Ubicomp 2006. Springer-Verlag (2006), 404--421. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. From spaces to places: emerging contexts in mobile privacy

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            UbiComp '09: Proceedings of the 11th international conference on Ubiquitous computing
            September 2009
            292 pages
            ISBN:9781605584317
            DOI:10.1145/1620545

            Copyright © 2009 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 30 September 2009

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            UbiComp '09 Paper Acceptance Rate31of251submissions,12%Overall Acceptance Rate764of2,912submissions,26%

            Upcoming Conference

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader