skip to main content
10.1145/1864349.1864363acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing

Published:26 September 2010Publication History

ABSTRACT

The popularity of micro-blogging has made general-purpose information sharing a pervasive phenomenon. This trend is now impacting location sharing applications (LSAs) such that users are sharing their location data with a much wider and more diverse audience. In this paper, we describe this as social-driven sharing, distinguishing it from past examples of what we refer to as purpose-driven location sharing. We explore the differences between these two types of sharing by conducting a comparative two-week study with nine participants. We found significant differences in terms of users' decisions about what location information to share, their privacy concerns, and how privacy-preserving their disclosures were. Based on these results, we provide design implications for future LSAs.

References

  1. }}BrightKite. http://brightkite.co.Google ScholarGoogle Scholar
  2. }}Foursquare. http://foursquare.com.Google ScholarGoogle Scholar
  3. }}Glympse: Share your where. http://www.glympse.co.Google ScholarGoogle Scholar
  4. }}Loopt. http://loopt.co.Google ScholarGoogle Scholar
  5. }}Please Rob Me. http://pleaserobme.com.Google ScholarGoogle Scholar
  6. }}Skyhook. http://skyhookwireless.com/locationapps.Google ScholarGoogle Scholar
  7. }}Barkhuus, L., Brown, B., Bell, M., et al. (2008). From awareness to repartee: sharing location within social groups. In CHI '08, 497--506. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. }}Benisch, M., Kelley, P.G., Sadeh, N., et al. (2008). The Impact of Expressiveness on the Effectiveness of Privacy Mechanisms for Location Sharing. Technical Report, CMU-ISR-08-141R, Carnegie Mellon University, Institute of Software Research.Google ScholarGoogle Scholar
  9. }}boyd, d. (2004). Friendster and publicly articulated social networking. In CHI '04, 1279--1282. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. }}Brown, B., Taylor, A.S., Izadi, S., et al. (2007). Locating Family Values: A Field Trial of the Whereabouts Clock In Ubicomp '07, 354--371. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. }}Consolvo, S., Smith, I., Matthews, T., et al. (2005). Location Disclosure to Social Relations: Why, When, & What People Want to Share. In CHI '05, 82--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. }}DePaulo, B.M. and Kashy, D.A. (1998). Everyday Lies in Close and Casual Relationships. Journal of Personality and Social Psychology, 74 (1), 63--79.Google ScholarGoogle ScholarCross RefCross Ref
  13. }}Donath, J. and boyd, d. (2004). Public displays of connection. BT Technology Journal, 22 (4), 71--82. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. }}Ellison, N.B., Steinfield, C. and Lampe, C. (2007). The benefits of Facebook "friends:" social capital and college students' use of online social network sites. Journal of Computer Mediated Communication, 12 (4), article 1.Google ScholarGoogle ScholarCross RefCross Ref
  15. }}Grinter, R.E. and Eldridge, M. (2001). y do tngrs luv 2 txt msg? In ECSCW '01, 219--238. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. }}Gross, R. and Acquisti, A. (2005). Information Revelation and Privacy in Online Social Networks. In WPES '05. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. }}Hsieh, G., Tang, K.P., Low, W.Y. and Hong, J.I. (2007). Field Deployment of IMBuddy: A Study of Privacy Control and Feedback Mechanisms for Contextual IM. In Ubicomp '07, 91--108. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. }}Iachello, G., Smith, I., Consolvo, S., et al. (2005). Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service. In Ubicomp '05, 213--231. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. }}Iachello, G., Smith, I., Consolvo, S., et al. (2005). Developing privacy guidelines for social location disclosure applications and services. In SOUPS '05, 65--76. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. }}Kumaraguru, P. and Cranor, L.F. (2005). Privacy Indexes: A Survey of Westin's Studies. Technical Report, CMU-ISRI-05-138, Carnegie Mellon University, Institute of Software Research.Google ScholarGoogle Scholar
  21. }}Lederer, S., Mankoff, J. and Dey, A.K. (2003). Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing. In CHI '03, 724--725. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. }}Lin, J., Xiang, G., Hong, J., et al. (2010). Modeling People's Place Naming Preferences in Location Sharing. In Ubicomp '10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. }}Marmasse, N., Schmandt, C. and Spectre, D. (2004). WatchMe: Communication and Awareness between Members of a Closely-Knit Group. In Ubicomp '04, 214--231.Google ScholarGoogle ScholarCross RefCross Ref
  24. }}Nardi, B.A., Whittaker, S. and Bradner, E. (2000). Interaction and outeraction: instant messaging in action. In CSCW '00, 79--88. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. }}O'Neill, N. Twitter Nears Facebook's Daily Status Update Volume. http://www.allfacebook.com/2010/02/twitter-facebook-status.Google ScholarGoogle Scholar
  26. }}Oulasvirta, A., Raento, M. and Tiitta, S. (2005). ContextContacts: re-designing smartphone's contact book to support mobile awareness and collaboration. In MobileHCI '05, 167--174. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. }}Patil, S. and Lai, J. (2005). Who Gets to Know What When: Configuring Privacy Preferences in an Awareness Application. In CHI '05, 101--110. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. }}Reilly, D., Dearman, D., Ha, V., et al. (2006). "Need to Know": Examining Information Need in Location Discourse. In Pervasive '06, 33--49. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. }}Resnick, P. Beyond Bowling Together: Sociotechnical Capital. In J. Carroll (Eds), HCI in the New Millennium, Addison-Wesley, 2001.Google ScholarGoogle Scholar
  30. }}Sadeh, N., Hong, J.I., Cranor, L., et al. (2008). Understanding and Capturing People's Privacy Policies in a People Finder Application. Journal of Personal & Ubiquitous Computing, 13 (6), 401--412. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. }}Tang, J.C., Yankelovich, N., Begole, J., et al. (2001). ConNexus to Awarenex: Extending Awareness to Mobile Users. In CHI '01, 221--228. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. }}Weilenmann, A. (2003). "I Can't Talk Now: I'm in a Fitting Room": Formulating Availability and Location in Mobile Phone Conversations. Environment and Planning A, 35 (Pion), 1589--1605.Google ScholarGoogle ScholarCross RefCross Ref
  33. }}Wellman, B., Haase, A.Q., Witte, J., et al. (2001). Does the Internet increase, decrease, or supplement social capital? Social networks, participation, and community commitment. American Behavioral Scientist, 45 (3), 436--455.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      UbiComp '10: Proceedings of the 12th ACM international conference on Ubiquitous computing
      September 2010
      366 pages
      ISBN:9781605588438
      DOI:10.1145/1864349

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 September 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      UbiComp '10 Paper Acceptance Rate39of202submissions,19%Overall Acceptance Rate764of2,912submissions,26%

      Upcoming Conference

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader