skip to main content
10.1145/1837110.1837129acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
research-article

On the impact of real-time feedback on users' behaviour in mobile location-sharing applications

Published:14 July 2010Publication History

ABSTRACT

Effective privacy management requires that mobile systems' users be able to make informed privacy decisions as their experience and knowledge of a system progresses. Prior work has shown that making such privacy decisions is a difficult task for users because systems do not provide support for awareness, visibility and accountability when sharing privacy-sensitive information. This paper reports results of our investigation into the efficacy of realtime feedback as a mechanism for incorporating these features of social translucence in location-sharing applications, in order to help users make better privacy decisions. We explored the role of real-time feedback in the context of Buddy Tracker, a mobile location-sharing application. Our work focuses on ways in which real-time feedback affects people's behaviour in order to identify the main criteria for acceptance of this technology. Based on the data from a three week field trial of Buddy Tracker, a focus group session, and interviews, we found that when using a system that provided real-time feedback, people were more accountable for their actions and reduced the number of unreasonable location requests. We have used the results of our study to propose high-level design criteria for incorporating real-time feedback into information sharing applications in a manner that ensures social acceptance of the technology.

References

  1. L. Jedrzejczyk, B. A. Price, A. K. Bandara, and B. Nuseibeh, I Know What You Did Last Summer: risks of location data leakage in mobile and social computing, Technical Report no 2009/11, Milton Keynes, UK: The Open University, 2009.Google ScholarGoogle Scholar
  2. L. F. Cranor and S. Garfinkel, Security and usability: designing secure systems that people can use, O'Reilly Media, Inc., 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. G. Myles, A. Friday, and N. Davies, "Preserving Privacy in Environments with Location-Based Applications," IEEE Pervasive Computing, vol. 2, 2003, pp. 56--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley, M. Prabaker, and J. Rao, "Understanding and capturing people's privacy policies in a people finder application," The Journal of Personal and Ubiquitous Computing, vol. 13, Aug. 2009, pp. 401--412. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. L. Palen and P. Dourish, "Unpacking privacy for a networked world," Proc. of CHI '03, ACM, 2003, p. 136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. V. Bellotti and A. Sellen, "Design for privacy in ubiquitous computing environments," Proc. of ECSCW '93, Kluwer Academic Publishers, 1993, pp. 77--92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Y. Tsai, P. Kelley, P. Drielsma, L. F. Cranor, J. Hong, and N. Sadeh, "Who's viewed you?: the impact of feedback in a mobile location-sharing application," Proc. of CHI '09, ACM, 2009, pp. 2003--2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Lederer, I. Hong, K. Dey, and A. Landay, "Personal privacy through understanding and action: five pitfalls for designers," Personal Ubiquitous Computing, vol. 8, 2004, pp. 440--454. Google ScholarGoogle ScholarCross RefCross Ref
  9. T. Erickson and W. A. Kellogg, "Social translucence: an approach to designing systems that support social processes," Trans. on Computer-Human Interaction (TOCHI), vol. 7, 2000, pp. 59--83. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Stumpf, V. Rajaram, L. Li, M. Burnett, T. Dietterich, E. Sullivan, R. Drummond, and J. Herlocker, "Toward harnessing user feedback for machine learning," Proc. of the 12th intl. conf. on Intelligent user interfaces, ACM, 2007, p. 91. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. W. W. Gaver, "Sound support for collaboration," Proc. CSCW'91, Kluwer Academic Publishers, 1991, p. 308. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Hong, "An Architecture for Privacy-Sensitive Ubiquitous Computing," Unpublished PhD Thesis, University of California at Berkeley, Computer Science Division, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Sellen, R. Eardley, S. Izadi, and R. Harper, "The whereabouts clock: early testing of a situated awareness device," Extended abstracts on Human factors in computing systems, CHI'06, ACM, 2006, p. 1312. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Raento and A. Oulasvirta, "Privacy management for social awareness applications," Proc. of CAPS Workshop, Citeseer, 2005, pp. 105--114.Google ScholarGoogle Scholar
  15. S. Robinson, P. Eslambolchilar, and M. Jones, "Sweep-Shake: finding digital resources in physical environments," Proc. of Mobile HCI'09, ACM, 2009, p. 12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Holland, D. R. Morse, and H. Gedenryd, "AudioGPS: Spatial audio navigation with a minimal attention interface," Personal and Ubiquitous Computing, vol. 6, 2002, pp. 253--259. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. Strachan, J. Williamson, and R. Murray-Smith, "Show me the way to Monte Carlo: density-based trajectory navigation," Proc. of CHI'07, ACM, 2007, p. 1248. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Wall and S. Brewster, "Feeling what you hear: tactile feedback for navigation of audio graphs," Proc. of CHI'06, ACM, 2006, p. 1132. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. S. Ackerman and L. Cranor, "Privacy critics: UI components to safeguard users' privacy," Proc. of CHI'99, ACM, 1999, pp. 258--259. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. R. W. Reeder, "Expandable Grids: A user interface visualization technique and a policy semantics to support fast, accurate security and privacy policy authoring," PhD Thesis, Carnegie Mellon University, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. C. Mancini, Y. Rogers, A. K. Bandara, T. Coe, L. Jedrzejczyk, A. N. Joinson, B. A. Price, K. Thomas, and B. Nuseibeh, "ContraVision: Exploring Users' Reactions to Futuristic Technology" Proc. of CHI'10, ACM, 2010, pp. 153--162. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. I. A. Junglas and C. Spitzmuller, "A research model for studying privacy concerns pertaining to location-based services," Proc. of the 38th Hawaii intl. conf. on system sciences, 2005, pp. 180--180. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. "The survey: Real-time feedback in Location Sharing Services." {Accessed: 5th of March 2010} http://computing-research.open.ac.uk/primma/lj/rt-survey/Google ScholarGoogle Scholar
  24. D. Corapi, O. Ray, A. M. Russo, A. K. Bandara, and E. C. Lupu, "Learning rules from user behaviour," Proc. of AIAI'09, Springer, 2009, p. 459.Google ScholarGoogle Scholar

Index Terms

  1. On the impact of real-time feedback on users' behaviour in mobile location-sharing applications

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          SOUPS '10: Proceedings of the Sixth Symposium on Usable Privacy and Security
          July 2010
          236 pages
          ISBN:9781450302647
          DOI:10.1145/1837110

          Copyright © 2010 Copyright is held by the author/owner.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 14 July 2010

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate15of49submissions,31%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader