skip to main content
10.1145/1054972.1054985acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Article

Location disclosure to social relations: why, when, & what people want to share

Published:02 April 2005Publication History

ABSTRACT

Advances in location-enhanced technology are making it easier for us to be located by others. These new technologies present a difficult privacy tradeoff, as disclosing one's location to another person or service could be risky, yet valuable. To explore whether and what users are willing to disclose about their location to social relations, we conducted a three-phased formative study. Our results show that the most important factors were who was requesting, why the requester wanted the participant's location, and what level of detail would be most useful to the requester. After determining these, participants were typically willing to disclose either the most useful detail or nothing about their location. From our findings, we reflect on the decision process for location disclosure. With these results, we hope to influence the design of future location-enhanced applications and services.

References

  1. Ackerman, M.S., et al. "Privacy in E-Commerce: Exploring User Scenarios and Privacy Preferences," In Proc. of the ACM Conf on Electronic Commerce: EC '99, pp. 1--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Adams, A. "Multimedia information changes the whole privacy ballgame," In Proc. of Computers, Freedom & Privacy '00, 2000, pp. 25--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Barkhuus, L. and Dey, A., "Location-Based Services for Mobile Telephony: a study of users' privacy concerns," Proc. of Interact '03, Zurich, 2003, pp.709--712.Google ScholarGoogle Scholar
  4. Barrett, L.F., Barrett, D.J., "An Introduction to Computerized Experience Sampling in Psychology," Social Science Computer Review, Vol. 19, No. 2, (Summer 2001), pp.175--85. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Begole J., et al. "Work rhythms: Analyzing visualizations of awareness histories of distributed groups", In Proc. of CSCW '02, pp. 334--343. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Consolvo, S. and Walker, M., "Using the Experience Sampling Method to Evaluate Ubicomp Applications," IEEE Pervasive Computing Mobile and Ubiquitous Systems, Vol. 2, No. 2, Apr-Jun 2003, pp. 24--31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. "Enhanced 911," 911 Services section, Federal Communications Commission: http://www.fcc.gov/911/enhanced/ (verified Jan 4, 2005).Google ScholarGoogle Scholar
  8. "Find People Nearby," mMode section, Cingular/AT&T Wireless website: http://www.attwireless.com/personal/features/organization/findfriends.jhtml (verified Jan 4, 2005).Google ScholarGoogle Scholar
  9. Goguen, J., "Are Agents an Answer or a Question?" Proc. of the JSAI-Synsophy International Workshop on Social Intelligence Design, 2001.Google ScholarGoogle Scholar
  10. Hong, J.I., Landay, J.A., "Support for Location: An Architecture for Privacy-Sensitive Ubiquitous Computing," In Proc. of Mobisys '04, Boston, Jun 2004, pp.177--89. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Hong, J.I., et al. "Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems." In Proc. of DIS '04, Cambridge, MA, pp. 91--100. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Hull, R., et al. "Enabling Context-Aware and Privacy-Conscious User Data Sharing," Proc. of the IEEE International Conference on Mobile Data Management: MDM '04, pp. 187--98.Google ScholarGoogle Scholar
  13. iESP software website: http://seattleweb.intel-research.net/projects/esm/iESP.html (verified Jan 6, 2005).Google ScholarGoogle Scholar
  14. Kochen, Manfred, Ed. The Small World. Ablex, Norwood, NJ, 1989.Google ScholarGoogle Scholar
  15. Lederer, S., Hong, J.I., Dey, A.K., Landay, J.A., "Personal Privacy through Understanding and Action: Five Pitfalls for Designers," Personal and Ubiquitous Computing, Vol. 8, Number 6, Nov 2004, pp.440--54. Google ScholarGoogle ScholarCross RefCross Ref
  16. Lederer, S., Mankoff, J., Dey, A.K. "Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing." In Extended Abstracts of CHI 2003, Apr 2003, pp.724--5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Olson, J.S., et al. "Preferences for Privacy Sharing: Results & Directions," CREW Technical Report. 2004.Google ScholarGoogle Scholar
  18. P&AB, "Consumer Privacy Attitudes: A Major Shift Since 2000 and Why," Privacy & American Business Newsletter, Vol. 10, Number 6, Sep 2003.Google ScholarGoogle Scholar
  19. Palen, L. and Dourish, P., "Unpacking "privacy" for a networked world," Proc. of CHI '03, pp. 129--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Palen, L. and Salzman, M., "Voice-mail diary studies for naturalistic data capture under mobile conditions," Proc. of CSCW '02, pp. 87--95. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Sacks, H., et al. (eds), Lectures on Conversation, Blackwell Publishers Jan 1995.Google ScholarGoogle Scholar
  22. Sheehan, K., "Toward a Typology of Internet Users and Online Privacy Concerns," The Information Society, Vol. 18, No. 1, 2002, pp.21--32.Google ScholarGoogle Scholar
  23. Smith, I., Consolvo, S., Hightower, J., Hughes, J., Iachello, G., LaMarca, A., Scott, J., Sohn, T., Abowd, G., "Social Disclosure of Place: From Location Technology to Communication Practice," Proc of the 3rd Int'l Conf on Pervasive Computing: Pervasive '05, Munich, Germany (May 2005 - to appear). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Location disclosure to social relations: why, when, & what people want to share

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              CHI '05: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
              April 2005
              928 pages
              ISBN:1581139985
              DOI:10.1145/1054972

              Copyright © 2005 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 2 April 2005

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Acceptance Rates

              CHI '05 Paper Acceptance Rate93of372submissions,25%Overall Acceptance Rate6,199of26,314submissions,24%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader