skip to main content
10.1145/2030112.2030140acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share

Published:17 September 2011Publication History

ABSTRACT

As ubiquitous computing becomes increasingly mobile and social, personal information sharing will likely increase in frequency, the variety of friends to share with, and range of information that can be shared. Past work has identified that whom you share with is important for choosing whether or not to share, but little work has explored which features of interpersonal relationships influence sharing. We present the results of a study of 42 participants, who self-report aspects of their relationships with 70 of their friends, including frequency of collocation and communication, closeness, and social group. Participants rated their willingness to share in 21 different scenarios based on information a UbiComp system could provide. Our findings show that (a) self-reported closeness is the strongest indicator of willingness to share, (b) individuals are more likely to share in scenarios with common information (e.g. we are within one mile of each other) than other kinds of scenarios (e.g. my location wherever I am), and (c) frequency of communication predicts both closeness and willingness to share better than frequency of collocation.

Skip Supplemental Material Section

Supplemental Material

5-3.mov

mov

66.7 MB

References

  1. Adams, P. The Real Life Social Network. Voices that Matter Web Design Conference, 2010. http://www. slideshare.net/padday/the-real-life-social-network-v2.Google ScholarGoogle Scholar
  2. Belk, R. Sharing. Journal of Consumer Research 36, 5 (2010), 715--734.Google ScholarGoogle ScholarCross RefCross Ref
  3. Binder, J., Howes, A., and Sutcliffe, A. The problem of conflicting social spheres: effects of network structure on experienced tension in social network sites. In Proc. CHI '09, (2009), 965--974. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. boyd, d.m. and Ellison, N.B. Social Network Sites: Definition, History, and Scholarship. JCMC 13, 1 (2008.Google ScholarGoogle Scholar
  5. Burke, M., Marlow, C., and Lento, T. Social network activity and social well-being. In Proc CHI '10 (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Choudhury, T. and Basu, S. Modeling conversational dynamics as a mixed-memory markov process. In Proc. NIPS '04, (2004).Google ScholarGoogle Scholar
  7. Christakis, N.A. and Fowler, J.H. Connected: The Surprising Power of Our Social Networks and How They Shape Our Lives. 2009.Google ScholarGoogle Scholar
  8. Consolvo, S., Smith, I.E., Matthews, T., LaMarca, A., Tabert, J., and Powledge, P. Location Disclosure to Social Relations: Why, When, & What People Want to Share. In Proc. CHI '0. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Cozby, P., Self-disclosure: A literature review. Psychological Bulletin, Vol 79(2), Feb 1973, 73--9.Google ScholarGoogle ScholarCross RefCross Ref
  10. Cranshaw, J., Toch, E., and Hong, J. Bridging the Gap Between Physical Location and Online Social Networks. In Proc. Ubicomp '10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Danezis, G. Inferring Privacy Policies for Social Networking Services. In Proc. AISec '09. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. De Choudhury, M., Mason, W.A., Hofman, J.M., and Watts, D.J. Inferring relevant social networks from interpersonal communication. Proc. WWW '10, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Derlega, V.J. and Chaikin, A.L. Privacy and Self-Disclosure in Social Relationships. Journal of Social Issues 33, 3 (1977), 102--115.Google ScholarGoogle ScholarCross RefCross Ref
  14. Eagle, N., Pentland, A., and Lazer, D. Inferring Social Network Structure using Mobile Phone Data. The National Academy of Sciences (PNAS) 106, 36 (2009), 15274--15278.Google ScholarGoogle Scholar
  15. Eagle, N. and Pentland, A. Eigenbehaviors: Identifying Structure in Routine. Behavioral Ecology and Sociobiology 63, 7 (2009), 1057--1066.Google ScholarGoogle ScholarCross RefCross Ref
  16. Eagle, N. Mobile Phones as Social Sensors. The Handbook of Emergent Technologies in Social Research, (2010).Google ScholarGoogle Scholar
  17. Elgan, M. The five stages of Facebook grief. Computerworld, 2010. http://www.computerworld.com/s/article/9179258/The_five_stages_of_Facebook_grief.Google ScholarGoogle Scholar
  18. Facebook. Statistics. http://www.facebook.com/press/info.php?statistics.Google ScholarGoogle Scholar
  19. Fang, L. and LeFevre, K. Privacy wizards for social networking sites. In Proc. WWW '10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Farnham, S.D. and Churchill, E.F. Faceted identity, faceted lives. In Proc. CSCW '11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Gilbert, E. and Karahalios, K. Predicting tie strength with social media. In Proc. CHI '09. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Goffman, E. The Presentation of Self in Everyday Life. Doubleday, 1959.Google ScholarGoogle Scholar
  23. Golder, S.A., Wilkinson, D., and Huberman, B.A. Rhythms of Social Interaction: Messaging within a Massive Online Network. In Proc. C&T '0.Google ScholarGoogle Scholar
  24. Google. Check in with Google Latitude. http://googlemobile.blogspot.com/2011/02/check-in-with-google-latitude.html.Google ScholarGoogle Scholar
  25. Granovetter, M. The Strength of Weak Ties: A Network Theory Revisited. Sociological Theory 1, (1983), 201--233.Google ScholarGoogle ScholarCross RefCross Ref
  26. Hidalgo, C.A. and Rodriguez-Sickert, C. The dynamics of a mobile phone network. Physica A: Statistical Mechanics and its Applications 387, 2008.Google ScholarGoogle Scholar
  27. Hsieh, G., Tang, K.P., and Hong, J.I. The Design and Evaluation of Privacy Controls and Feedback Mechanisms for Contextual Instant Messaging. (2007).Google ScholarGoogle Scholar
  28. Jones, S. and O'Neill, E. Feasibility of Structural Network Clustering for Group-Based Privacy Control in Social Networks. In Proc. SOUPS '10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Kelley, P.G., Brewer, R., Mayer, Y., Cranor, L.F., Sadeh, N. An Investigation into Facebook Friend Grouping. In Proc. INTERACT '11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Khalil, A. and Connelly, K. Context-aware telephony: privacy preferences & sharing patterns. Proc. CHI '06.Google ScholarGoogle Scholar
  31. Lampinen, A., Tamminen, S., and Oulasvirta, A. All My People Right Here, Right Now: management of group co-presence on a social networking site. In Proc. CSCW '09. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Lederer, S., Mankoff, J.C., and Dey, A.K. Who Wants to Know What When? In Proc. CHI '03.Google ScholarGoogle Scholar
  33. Lin, J., Xiang, G., Hong, J.I., and Sadeh, N. Modeling People's Place Naming Preferences in Location Sharing. In Proc. Ubicomp '10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. McCarty, C. Structure in Personal Networks. Journal of Social Structure 3, (2005).Google ScholarGoogle Scholar
  35. Miluzzo, E., Lane, N.D., Fodor, K., et al. Sensing Meets Mobile Social Networks: The Design, Implementation and Evaluation of the CenceMe Application. In Proc. SenSys '08. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Odom, W., Zimmerman, J., and Forlizzi, J. Teenagers and Their Virtual Possessions: Design Opportunities and Issues. In Proc. CHI '11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Olson, J., Grudin, J., and Horvitz, E. A study of preferences for sharing and privacy. In Proc. CHI '05. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Ozenc, F.K. and Farnham, S.D. Life "Modes" in Social Media. In Proc. of CHI '11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Palen, L. and Dourish, P. Unpacking "Privacy" for a Networked World. CHI Letters 5, 1 (2003), 129--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Spencer, L. and Pahl, R.E. Rethinking friendship: hidden solidarities today. Princeton University Press, 2006.Google ScholarGoogle Scholar
  41. Tang, J.C., Yankelovich, N., Begole, J., Kleek, M.V., Li, F., and Bhalodia, J. ConNexus to awarenex: extending awareness to mobile users. In Proc.CHI '01. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Tang, K.P., Keyani, P., Fogarty, J., and Hong, J.I. Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications. In Proc. CHI '06. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Tsai, J., Kelley, P., Drielsma, P.H., Cranor, L.F., Hong, J., and Sadeh, N. Who's viewed you? the impact of feedback in a mobile-location system. In Proc. CHI '09. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Wilson, C., Boe, B., Sala, A., Puttaswamy, K.P.N., and Zhao, B.Y. User interactions in social networks and their implications. In Proc. EuroSys 09. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Xiang, R., Neville, J., and Rogati, M. Modeling relationship strength in online social networks. In Proc. WWW '10. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      UbiComp '11: Proceedings of the 13th international conference on Ubiquitous computing
      September 2011
      668 pages
      ISBN:9781450306300
      DOI:10.1145/2030112

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 September 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate764of2,912submissions,26%

      Upcoming Conference

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader