skip to main content
10.1145/1864349.1864364acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

Empirical models of privacy in location sharing

Published:26 September 2010Publication History

ABSTRACT

The rapid adoption of location tracking and mobile social networking technologies raises significant privacy challenges. Today our understanding of people's location sharing privacy preferences remains very limited, including how these preferences are impacted by the type of location tracking device or the nature of the locations visited. To address this gap, we deployed Locaccino, a mobile location sharing system, in a four week long field study, where we examined the behavior of study participants (n=28) who shared their location with their acquaintances (n=373.) Our results show that users appear more comfortable sharing their presence at locations visited by a large and diverse set of people. Our study also indicates that people who visit a wider number of places tend to also be the subject of a greater number of requests for their locations. Over time these same people tend to also evolve more sophisticated privacy preferences, reflected by an increase in time- and location-based restrictions. We conclude by discussing the implications our findings.

References

  1. }}D. Anthony, D. Kotz, and T. Henderson. Privacy in location-aware computing environments. IEEE Pervasive Computing, 6(4):64--72, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. }}L. Barkhuus, B. Brown, M. Bell, S. Sherwood, M. Hall, and M. Chalmers. From awareness to repartee: sharing location within social groups. In CHI, pages 497--506, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. }}M. Benisch, P. G. Kelley, N. Sadeh, T. Sandholm, L. F. Cranor, P. H. Drielsma, and J. Tsai. The impact of expressiveness on the effectiveness of privacy mechanisms for location sharing. Tech Report, 2009.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. }}B. Brown, A. Taylor, S. Izadi, A. Sellen, J. Kaye, and R. Eardley. Location family values: A field trial of the whereabouts clock. In Ubicomp '07, pages 354--371. Springer-Verlag, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. }}S. Consolovo, I. Smith, T. Matthews, A. LaMarca, J. Tabert, and P. Powledge. Location disclosure to social relations: Why, when, & what people want to share. In CHI '05, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. }}J. Cranshaw, E. Toch, J. Hong, A. Kittur, and N. Sadeh. Bridging the gap between physical location and online social networks. Technical Report CMU-ISR-10-107, Institute for Software Research technical report, Pittsburgh, PA, 2010.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. }}N. Eagle and A. S. Pentland. Reality mining: sensing complex social systems. Personal Ubiquitous Comput., 10(4):255--268, May 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. }}M. C. Gonzalez, C. A. Hidalgo, and A.-L. Barabasi. Understanding individual human mobility patterns. Nature, 453(7196):779--782, June 2008.Google ScholarGoogle ScholarCross RefCross Ref
  9. }}G. Iachello, I. Smith, S. Consolovo, G. Abowd, J. Hughes, J. Howard, F. Potter, J. Scott, T. Sohn, J. Hightower, and A. LaMarca. Control, deception, and communication: Evaluating the deployment of a location-enhanced messaging service. In Ubicomp 2005, pages 213 -- 231. Springer-Verlag, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. }}P. Ingwersen. Cognitive perspectives of information retrieval interaction: Elements of a cognitive IR theory. Journal of Documentation, pages 3--50, 1996.Google ScholarGoogle ScholarCross RefCross Ref
  11. }}A. Khalil and K. Connelly. Context-aware telephony: Privacy preferences and sharing patterns. In CSCW '06, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. }}C. Mancini, K. Thomas, Y. Rogers, B. A. Price, L. Jedrzejczyk, A. K. Bandara, A. N. Joinson, and B. Nuseibeh. From spaces to places: emerging contexts in mobile privacy. In Ubicomp '09, pages 1--10, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. }}L. Palen and P. Dourish. Unpacking "privacy" for a networked world. In CHI '03: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 129--136, New York, NY, USA, 2003. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. }}N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley, M. Prabaker, and J. Rao. Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing, 13(16):401 -- 412, August 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. }}J. Tsai, P. Kelley, P. H. Drielsma, L. F. Cranor, J. Hong. and N. Sadeh. Who's viewed you? the impact of feedback in a mobile-location system. In CHI '09. pages 2003--2012, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. }}J. Tsai, P. Kelley, P. H. Drielsma, L. F. Cranor, J. Hong, and N. Sadeh. Who's viewed you? the impact of feedback in a mobile-location system. In Proceedings of the 27th international conference on Human factors in computing systems, pages 2003--2012, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. }}T. Xu and Y. Cai. Feeling-based location privacy protection for location-based services. In CCS '09: Proceedings of the 16th ACM conference on Computer and communications security, pages 348--357, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. }}M. Xue, P. Kalnis, and H. K. Pung. Location diversity: Enhanced privacy protection in location based services. In LoCA '09: Proceedings of the 4th International Symposium on Location and Context Awareness, pages 70--87, Berlin, Heidelberg, 2009. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Empirical models of privacy in location sharing

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        UbiComp '10: Proceedings of the 12th ACM international conference on Ubiquitous computing
        September 2010
        366 pages
        ISBN:9781605588438
        DOI:10.1145/1864349

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 26 September 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        UbiComp '10 Paper Acceptance Rate39of202submissions,19%Overall Acceptance Rate764of2,912submissions,26%

        Upcoming Conference

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader