skip to main content
10.1145/2556288.2557121acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Reflection or action?: how feedback and control affect location sharing decisions

Authors Info & Claims
Published:26 April 2014Publication History

ABSTRACT

Owing to the ever-expanding size of social and professional networks, it is becoming cumbersome for individuals to configure information disclosure settings. We used location sharing systems to unpack the nature of discrepancies between a person's disclosure settings and contextual choices. We conducted an experience sampling study (N = 35) to examine various factors contributing to such divergence. We found that immediate feedback about disclosures without any ability to control the disclosures evoked feelings of oversharing. Moreover, deviation from specified settings did not always signal privacy violation; it was just as likely that settings prevented information disclosure considered permissible in situ. We suggest making feedback more actionable or delaying it sufficiently to avoid a knee-jerk reaction. Our findings also make the case for proactive techniques for detecting potential mismatches and recommending adjustments to disclosure settings, as well as selective control when sharing location with socially distant recipients and visiting atypical locations.

References

  1. Anthony, D., Henderson, T., and Kotz, D. Privacy in location-aware computing environments. IEEE Pervasive Computing 6, 4 (2007), 64--72. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Bailey, B. P., and Iqbal, S. T. Understanding changes in mental workload during execution of goal-directed tasks and its application for interruption management. ACM Transactions on Compututer-Human Interaction 14, 4 (2008), 1--28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Benisch, M., Kelley, P., Sadeh, N., and Cranor, L. Capturing location-privacy preferences: Quantifying accuracy and user-burden tradeoffs. Personal and Ubiquitous Computing 15, 7 (2011), 679--694. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Biehl, J. T., Rieffel, E. G., and Lee, A. J. When privacy and utility are in harmony: Towards better design of presence technologies. Personal and Ubiquitous Computing 17, 3 (2013), 503--518. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bilton, N. Burglars said to have picked houses based on Facebook updates, Sept. 2012. http://bits.blogs.nytimes.com/2010/09/12/burglars-picked-houses-based-on-facebook-updates/ (Accessed May 29, 2013).Google ScholarGoogle Scholar
  6. Consolvo, S., Smith, I. E., Matthews, T., LaMarca, A., Tabert, J., and Powledge, P. Location disclosure to social relations: Why, when, & what people want to share. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '05, ACM (New York, NY, USA, 2005), 81--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Cuellar, J. R., Morris Jr., J. B., Mulligan, D. K., Peterson, J., and Polk, J. M. Geopriv requirements, Feb. 2004. RFC 3693. http://www.ietf.org/rfc/rfc3693.txt. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Facebook post gets worker fired, Mar. 2009. http://sports.espn.go.com/nfl/news/story?id=3965039 (Accessed May 29, 2013).Google ScholarGoogle Scholar
  9. Hengartner, U., and Steenkiste, P. Implementing access control to people location information. In Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, SACMAT '04, ACM (New York, NY, USA, 2004), 11--20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Hsieh, G., Tang, K. P., Low, W. Y., and Hong, J. I. Field deployment of IMBuddy : A study of privacy control and feedback mechanisms for contextual IM. In UbiComp 2007: Ubiquitous Computing, vol. 4717 of Lecture Notes in Computer Science, Springer Berlin Heidelberg (2007), 91--108. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Iachello, G., Smith, I. E., Consolvo, S., Abowd, G. D., Hughes, J., Howard, J., Potter, F., Scott, J., Sohn, T., Hightower, J., and LaMarca, A. Control, deception, and communication: Evaluating the deployment of a location-enhanced messaging service. In UbiComp 2005: Ubiquitous Computing, vol. 3660 of Lecture Notes in Computer Science, Springer Berlin Heidelberg (2005), 213--231. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Khalil, A., and Connelly, K. Context-aware telephony: Privacy preferences and sharing patterns. In Proceedings of the 2006 20th Anniversary Conference on Computer Supported Cooperative Work, CSCW '06, ACM (New York, NY, USA, 2006), 469--478. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Khan, R. M., and Khan, M. A. Academic sojourners, culture shock and intercultural adaptation: A trend analysis. Studies About Languages 10 (2007), 38--46.Google ScholarGoogle Scholar
  14. Knijnenburg, B. P., Kobsa, A., and Jin, H. Preference-based location sharing: Are more privacy options really better? In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '13, ACM, ACM (New York, NY, USA, 2013), 2667--2676. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Larson, R., and Csikszentmihalyi, M. The experience sampling method. New Directions for Methodology of Social and Behavioral Science 15 (1983), 41--56.Google ScholarGoogle Scholar
  16. Le Gall, Y., Lee, A. J., and Kapadia, A. PlexC: A policy language for exposure control. In Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, SACMAT '12, ACM (New York, NY, USA, 2012), 219--228. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Malhotra, N. K., Kim, S. S., and Agarwal, J. Internet Users' Information Privacy Concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research 15 (December 2004), 336--355. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Mao, H., Shuai, X., and Kapadia, A. Loose tweets: An analysis of privacy leaks on Twitter. In Proceedings of The 2011 ACM Workshop on Privacy in the Electronic Society, WPES '11, ACM (New York, NY, USA, Oct. 2011), 1--11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Mazurek, M. L., Klemperer, P. F., Shay, R., Takabi, H., Bauer, L., and Cranor, L. F. Exploring reactive access control. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '11, ACM (New York, NY, USA, 2011), 2085--2094. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Myles, G., Friday, A., and Davies, N. Preserving privacy in environments with location-based applications. IEEE Pervasive Computing 2, 1 (Jan.-Mar. 2003), 56--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Patil, S., and Lai, J. Who gets to know what when: Configuring privacy permissions in an awareness application. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '05, ACM (New York, NY, USA, 2005), 101--110. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Patil, S., Norcie, G., Kapadia, A., and Lee, A. J. Reasons, rewards, regrets: Privacy considerations in location sharing as an interactive practice. In Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, ACM (New York, NY, USA, 2012), 5:1--5:15. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Sadeh, N. M., Hong, J. I., Cranor, L. F., Fette, I., Kelley, P. G., Prabaker, M. K., and Rao, J. Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing 13, 6 (2009), 401--412. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Schlegel, R., Kapadia, A., and Lee, A. J. Eyeing your exposure: Quantifying and controlling information sharing for improved privacy. In Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS '11, ACM (New York, NY, USA, 2011), 14:1--14:14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Toch, E., Cranshaw, J., Drielsma, P. H., Tsai, J. Y., Kelley, P. G., Springfield, J., Cranor, L. F., Hong, J. I., and Sadeh, N. M. Empirical models of privacy in location sharing. In Proceedings of the 12th ACM International Conference on Ubiquitous Computing, Ubicomp '10, ACM (New York, NY, USA, 2010), 129--138. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Tsai, J. Y., Kelley, P. G., Drielsma, P. H., Cranor, L. F., Hong, J. I., and Sadeh, N. M. Who's viewed you?: The impact of feedback in a mobile location-sharing application. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '09, ACM (New York, NY, USA, 2009), 2003--2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Wang, Y., Komanduri, S., Leon, P., Norcie, G., Acquisti, A., and Cranor, L. "I regretted the minute I pressed share": A qualitative study of regrets on Facebook. In Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS '11, ACM (New York, NY, USA, 2011), 10:1--10:16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Wiese, J., Kelley, P. G., Cranor, L. F., Dabbish, L., Hong, J. I., and Zimmerman, J. Are you close with me? Are you nearby?: Investigating social groups, closeness, and willingness to share. In Proceedings of the 13th International Conference on Ubiquitous Computing, Ubicomp '11, ACM (New York, NY, USA, 2011), 197--206. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Reflection or action?: how feedback and control affect location sharing decisions

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CHI '14: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
          April 2014
          4206 pages
          ISBN:9781450324731
          DOI:10.1145/2556288

          Copyright © 2014 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 26 April 2014

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          CHI '14 Paper Acceptance Rate465of2,043submissions,23%Overall Acceptance Rate6,199of26,314submissions,24%

          Upcoming Conference

          CHI '24
          CHI Conference on Human Factors in Computing Systems
          May 11 - 16, 2024
          Honolulu , HI , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader