ABSTRACT
Mobile privacy concerns are central to Ubicomp and yet remain poorly understood. We advocate a diversified approach, enabling the cross-interpretation of data from complementary methods. However, mobility imposes a number of limitations on the methods that can be effectively employed. We discuss how we addressed this problem in an empirical study of mobile social networking. We report on how, by combining a variation of experience sampling and contextual interviews, we have started focusing on a notion of context in relation to privacy, which is subjectively defined by emerging socio-cultural knowledge, functions, relations and rules. With reference to Gieryn's sociological work, we call this place, as opposed to a notion of context that is objectively defined by physical and factual elements, which we call space. We propose that the former better describes the context for mobile privacy.
- Barkhuus, L. and Dey, A. Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns. Proc. INTERACT 2003. ACM Press (2003).Google Scholar
- Consolvo, S., Smith, I.E., Matthews, T., Lamarca, A. Tabert, J., Powledge, P. Location Disclosure to Social Relations: Why, When And What People Want to Share. Proc. SIGCHI Human Factors in Computing Systems. ACM press (2005), 81--90. Google ScholarDigital Library
- Khalil, A. and Connelly, K. Context-Aware Telephony: Privacy Preferences and Sharing Patterns. Proc. CSCW 2006. ACM Press (2006), 469--478. Google ScholarDigital Library
- Price, B.A., Adam, K. and Nuseibeh, B. Keeping Ubiquitous Computing to Yourself: A Practical Model for User Control of Privacy. International Journal of Human-Computer Studies (2005). 63(1-2), 228--253. Google ScholarDigital Library
- Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M. and Rao J. Understanding and Capturing People's Privacy Policies in Mobile Social Networking Application. Journal of Personal and Ubiquitous Computing (2008). 13(6), 401--412. Google ScholarDigital Library
- http://www.usatoday.com/tech/science/2008-09-21-big-brother-restaurant_N.htm?csp=34.Google Scholar
- Smith, H., Fitzpatrick, G., and Rogers., Y. Eliciting Reactive and Reflective Feedback for a Social Communication Tool: A Multi-Session Approach. Proc. DIS 2004. ACM Press (2004), 39--48. Google ScholarDigital Library
- Rogers, Y., et al., Why It's Worth the Hassle: The Value of In-Situ Studies When Designing Ubicomp. UbiComp 2007: Ubiquitous Computing. Springer (2007), 336--353. Google ScholarDigital Library
- Antón, A.I., Bertino, E., Li, N., Yu, T. A Roadmap for Comprehensive Online Privacy Policy Management. Commun. ACM (2007), 50(7), 109--116. Google ScholarDigital Library
- Consolvo, S. and Walker, M. Using the Experience Sampling Method to Evaluate Ubicomp Applications. Pervasive Computing, IEEE (2003), 2(2), 24--31. Google ScholarDigital Library
- O'Brien, J. Rodeen, T. Rouncefield, M., Hughes, J. At Home with the Technology: an Ethnographic Study of a Set-Top-Box Trial. ACM Transactions on Computer-Human Interaction. (1999), 6(3), 282--308. Google ScholarDigital Library
- Kindberg, T., O'Neil, E., Bevan, C., Kostakos, V., Stanton Fraser, D., Jay, T. Measuring Trust in Wi-Fi Hotspots. Proc. SIGCHI Human Factors in Computing Systems. ACM Press (2008), 173--182. Google ScholarDigital Library
- Schilit, B., Adams, N., and Want, R. Context-Aware Computing Applications. Proc. Mobile Computing Systems and Applications (1994), 85--90. Google ScholarDigital Library
- Dey, A.K., Understanding and Using Context. Personal Ubiquitous Computing (2001), 5(1), 4--7. Google ScholarDigital Library
- Ahern, S., Eckles, D., Good, N., King, S., Naaman, M., Nair, R. Over-Exposed? Privacy Patterns and Considerations in Online and Mobile Photo Sharing. Proc. SIGCHI Human Factors in Computing Systems. ACM Press (2007), 357--366. Google ScholarDigital Library
- De Guzman, E.S., Sharmin, M., and Bailey, B.P. Should I Call Now? Understanding What Context Is Considered When Deciding Whether to Initiate Remote Communication Via Mobile Devices. Proc. Graphics Interface (2007), 143--150. Google ScholarDigital Library
- Iachello, G., Truong, K.N., Abowd, G.D., Hayes, G.R., Stevens, M. Prototyping and Sampling Experience to Evaluate Ubiquitous Computing Privacy in the Real World. Proc. SIGCHI Human Factors in Computing Systems. ACM Press (2006), 1009--1018. Google ScholarDigital Library
- Miner, A.G., Glomb, T.M., and Hulin, C.L. Mood at Work: Experience Sampling Using Palmtop Computers. Symposium Experience-Sampling Methods in Organisational Research, Society for Industrial and Organisational Psychology. (2001).Google Scholar
- Holtzblatt, K., Top Field Interviewing Mistakes: Recognizing and Preventing Them, CHI 2009 (2009).Google Scholar
- Proust, M., A La Recherche du Temps Perdu. Grasset&N.R.F. (1912--28).Google Scholar
- http://primma.open.ac.ukGoogle Scholar
- Mancini, C., Rogers, Y., Jedrzejczyk, L., Thomas, K., Price, B.A., Joinson, A. N., Bandara, A.K., Nuseibeh, B. A Multi-Pronged Empirical Approach to Mobile Privacy Investigation. Workshop Mobile User Experience Research: Challenges, Methods&Tools, CHI 2009 (2009).Google Scholar
- http://en.wikipedia.org/wiki/Facebook.Google Scholar
- Gross, R., Acquisti, A., and Heinz III, J.H. Information Revelation and Privacy in Online Social Networks. Proc. ACM Workshop Privacy in the Electronic Society. ACM Press (2005), 71--80. Google ScholarDigital Library
- Acquisti, A. and Gross, R. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. PET 2006. Springer (2006), 36--58. Google ScholarDigital Library
- Joinson, A.N. Looking at, Looking Up or Keeping Up with People? Motives and Use of Facebook. Proc. SIGCHI Human Factors in Computing Systems. ACM Press (2008), 1027--1036. Google ScholarDigital Library
- Tsai, J.Y., Kelley, P., Drielsma, P., Cranor, L.F., Hong, J., Sadeh, N. Who's Viewed You? The Impact of Feedback in a Mobile Location-Sharing Application. Proc. SIGHCI Human Factors in Computing Systems. ACM Press (2009), 2003--2012. Google ScholarDigital Library
- Tolmie, P., Pycock, J., Diggins, T., MacLean, A., and Karsenty, A. Unremarkable Computing. Proc. SIGCHI Human Factors in Computing Systems. ACM Press (2002), 399--406. Google ScholarDigital Library
- Esbjörnsson, M. and Weilenmann, A. Mobile Phone Talk in Context. Dey, A., Turner, R., Kokinov, B., Leake, D. Modeling and Using Context. Springer (2005), 140--154. Google ScholarDigital Library
- Altman, I. The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding. Brooks/Cole Pub. Co (1975)Google Scholar
- Altman, I. Privacy Regulation: Culturally Universal or Culturally Specific? Journal of Social Issues (1977), 33(3), 66--84.Google ScholarCross Ref
- Dourish, P. What We Talk About When We Talk About Context? Personal Ubiquitous Computing (2004), 8(1), 19--30. Google ScholarDigital Library
- Tamminen, S., Oulasvirta, A., Toiskallio, K., Kankainen, A. Understanding mobile contexts. Personal Ubiquitous Computing (2004), 8(2), 135--143. Google ScholarCross Ref
- Gardies, A. L'Espace au Cinéma. Méridiens Klincksieck (1993).Google Scholar
- Harrison, S. and Dourish, P. Re-Place-Ing Space: the Roles of Place and Space in Collaborative Systems. Proc. CSCW 1996. ACM Press (1996), 67--76. Google ScholarDigital Library
- Dourish, P. Re-Space-Ing Place: "Place" and "Space" Ten Years On. Proc. CSCW 2006. ACM Press (2006), 299--308. Google ScholarDigital Library
- Gieryn, T.F. A Space for Place in Sociology. Annual Review of Sociology (2000), 26(1), 463--396.Google Scholar
- Rogers, Y. Moving on from Weiser's Vision of Calm Computing: Engaging UbiComp Experiences. Proc. Ubicomp 2006. Springer-Verlag (2006), 404--421. Google ScholarDigital Library
Index Terms
- From spaces to places: emerging contexts in mobile privacy
Recommendations
"I am kind of a nomad where I have to go places and places" ... Understanding mobility, place and identity in global software work from India
Mobilities, encompassing the movements and 'flows' of people, objects, capital, images technologies and information across the world have been strongly implicated in the context of contemporary globalization processes. Globally distributed software ...
The Appropriation of Information and Communication Technology: A Cross-Cultural Perspective
Proceedings of the 13th International Conference on Human-Computer Interaction. Part I: New TrendsIn this paper we explore the process of appropriation attempting to broaden the set of topics considered significant on it. We present a model of appropriation derived from two studies conducted in the UK, Japan, South Korea and China. We describe our ...
Nice-looking obstacles: parkour as urban practice of deterritorialization
Most academic publications refer to Parkour as a subversive and embodied tactic that challenges hegemonic discourses of discipline and control. Architecture becomes the playful ground where new ways to move take form. These approaches rarely address the ...
Comments