ABSTRACT
Owing to the ever-expanding size of social and professional networks, it is becoming cumbersome for individuals to configure information disclosure settings. We used location sharing systems to unpack the nature of discrepancies between a person's disclosure settings and contextual choices. We conducted an experience sampling study (N = 35) to examine various factors contributing to such divergence. We found that immediate feedback about disclosures without any ability to control the disclosures evoked feelings of oversharing. Moreover, deviation from specified settings did not always signal privacy violation; it was just as likely that settings prevented information disclosure considered permissible in situ. We suggest making feedback more actionable or delaying it sufficiently to avoid a knee-jerk reaction. Our findings also make the case for proactive techniques for detecting potential mismatches and recommending adjustments to disclosure settings, as well as selective control when sharing location with socially distant recipients and visiting atypical locations.
- Anthony, D., Henderson, T., and Kotz, D. Privacy in location-aware computing environments. IEEE Pervasive Computing 6, 4 (2007), 64--72. Google ScholarDigital Library
- Bailey, B. P., and Iqbal, S. T. Understanding changes in mental workload during execution of goal-directed tasks and its application for interruption management. ACM Transactions on Compututer-Human Interaction 14, 4 (2008), 1--28. Google ScholarDigital Library
- Benisch, M., Kelley, P., Sadeh, N., and Cranor, L. Capturing location-privacy preferences: Quantifying accuracy and user-burden tradeoffs. Personal and Ubiquitous Computing 15, 7 (2011), 679--694. Google ScholarDigital Library
- Biehl, J. T., Rieffel, E. G., and Lee, A. J. When privacy and utility are in harmony: Towards better design of presence technologies. Personal and Ubiquitous Computing 17, 3 (2013), 503--518. Google ScholarDigital Library
- Bilton, N. Burglars said to have picked houses based on Facebook updates, Sept. 2012. http://bits.blogs.nytimes.com/2010/09/12/burglars-picked-houses-based-on-facebook-updates/ (Accessed May 29, 2013).Google Scholar
- Consolvo, S., Smith, I. E., Matthews, T., LaMarca, A., Tabert, J., and Powledge, P. Location disclosure to social relations: Why, when, & what people want to share. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '05, ACM (New York, NY, USA, 2005), 81--90. Google ScholarDigital Library
- Cuellar, J. R., Morris Jr., J. B., Mulligan, D. K., Peterson, J., and Polk, J. M. Geopriv requirements, Feb. 2004. RFC 3693. http://www.ietf.org/rfc/rfc3693.txt. Google ScholarDigital Library
- Facebook post gets worker fired, Mar. 2009. http://sports.espn.go.com/nfl/news/story?id=3965039 (Accessed May 29, 2013).Google Scholar
- Hengartner, U., and Steenkiste, P. Implementing access control to people location information. In Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, SACMAT '04, ACM (New York, NY, USA, 2004), 11--20. Google ScholarDigital Library
- Hsieh, G., Tang, K. P., Low, W. Y., and Hong, J. I. Field deployment of IMBuddy : A study of privacy control and feedback mechanisms for contextual IM. In UbiComp 2007: Ubiquitous Computing, vol. 4717 of Lecture Notes in Computer Science, Springer Berlin Heidelberg (2007), 91--108. Google ScholarDigital Library
- Iachello, G., Smith, I. E., Consolvo, S., Abowd, G. D., Hughes, J., Howard, J., Potter, F., Scott, J., Sohn, T., Hightower, J., and LaMarca, A. Control, deception, and communication: Evaluating the deployment of a location-enhanced messaging service. In UbiComp 2005: Ubiquitous Computing, vol. 3660 of Lecture Notes in Computer Science, Springer Berlin Heidelberg (2005), 213--231. Google ScholarDigital Library
- Khalil, A., and Connelly, K. Context-aware telephony: Privacy preferences and sharing patterns. In Proceedings of the 2006 20th Anniversary Conference on Computer Supported Cooperative Work, CSCW '06, ACM (New York, NY, USA, 2006), 469--478. Google ScholarDigital Library
- Khan, R. M., and Khan, M. A. Academic sojourners, culture shock and intercultural adaptation: A trend analysis. Studies About Languages 10 (2007), 38--46.Google Scholar
- Knijnenburg, B. P., Kobsa, A., and Jin, H. Preference-based location sharing: Are more privacy options really better? In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '13, ACM, ACM (New York, NY, USA, 2013), 2667--2676. Google ScholarDigital Library
- Larson, R., and Csikszentmihalyi, M. The experience sampling method. New Directions for Methodology of Social and Behavioral Science 15 (1983), 41--56.Google Scholar
- Le Gall, Y., Lee, A. J., and Kapadia, A. PlexC: A policy language for exposure control. In Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, SACMAT '12, ACM (New York, NY, USA, 2012), 219--228. Google ScholarDigital Library
- Malhotra, N. K., Kim, S. S., and Agarwal, J. Internet Users' Information Privacy Concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research 15 (December 2004), 336--355. Google ScholarDigital Library
- Mao, H., Shuai, X., and Kapadia, A. Loose tweets: An analysis of privacy leaks on Twitter. In Proceedings of The 2011 ACM Workshop on Privacy in the Electronic Society, WPES '11, ACM (New York, NY, USA, Oct. 2011), 1--11. Google ScholarDigital Library
- Mazurek, M. L., Klemperer, P. F., Shay, R., Takabi, H., Bauer, L., and Cranor, L. F. Exploring reactive access control. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '11, ACM (New York, NY, USA, 2011), 2085--2094. Google ScholarDigital Library
- Myles, G., Friday, A., and Davies, N. Preserving privacy in environments with location-based applications. IEEE Pervasive Computing 2, 1 (Jan.-Mar. 2003), 56--64. Google ScholarDigital Library
- Patil, S., and Lai, J. Who gets to know what when: Configuring privacy permissions in an awareness application. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '05, ACM (New York, NY, USA, 2005), 101--110. Google ScholarDigital Library
- Patil, S., Norcie, G., Kapadia, A., and Lee, A. J. Reasons, rewards, regrets: Privacy considerations in location sharing as an interactive practice. In Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, ACM (New York, NY, USA, 2012), 5:1--5:15. Google ScholarDigital Library
- Sadeh, N. M., Hong, J. I., Cranor, L. F., Fette, I., Kelley, P. G., Prabaker, M. K., and Rao, J. Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing 13, 6 (2009), 401--412. Google ScholarDigital Library
- Schlegel, R., Kapadia, A., and Lee, A. J. Eyeing your exposure: Quantifying and controlling information sharing for improved privacy. In Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS '11, ACM (New York, NY, USA, 2011), 14:1--14:14. Google ScholarDigital Library
- Toch, E., Cranshaw, J., Drielsma, P. H., Tsai, J. Y., Kelley, P. G., Springfield, J., Cranor, L. F., Hong, J. I., and Sadeh, N. M. Empirical models of privacy in location sharing. In Proceedings of the 12th ACM International Conference on Ubiquitous Computing, Ubicomp '10, ACM (New York, NY, USA, 2010), 129--138. Google ScholarDigital Library
- Tsai, J. Y., Kelley, P. G., Drielsma, P. H., Cranor, L. F., Hong, J. I., and Sadeh, N. M. Who's viewed you?: The impact of feedback in a mobile location-sharing application. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '09, ACM (New York, NY, USA, 2009), 2003--2012. Google ScholarDigital Library
- Wang, Y., Komanduri, S., Leon, P., Norcie, G., Acquisti, A., and Cranor, L. "I regretted the minute I pressed share": A qualitative study of regrets on Facebook. In Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS '11, ACM (New York, NY, USA, 2011), 10:1--10:16. Google ScholarDigital Library
- Wiese, J., Kelley, P. G., Cranor, L. F., Dabbish, L., Hong, J. I., and Zimmerman, J. Are you close with me? Are you nearby?: Investigating social groups, closeness, and willingness to share. In Proceedings of the 13th International Conference on Ubiquitous Computing, Ubicomp '11, ACM (New York, NY, USA, 2011), 197--206. Google ScholarDigital Library
Index Terms
- Reflection or action?: how feedback and control affect location sharing decisions
Recommendations
A value sensitive action-reflection model: evolving a co-design space with stakeholder and designer prompts
CHI '13: Proceedings of the SIGCHI Conference on Human Factors in Computing SystemsWe introduce a design method for evolving a co-design space to support stakeholders untrained in design. Specifically, the purpose of the method is to expand and shape a co-design space so that stakeholders, acting as designers, focus not only on the ...
Self-Reflection and Personal Physicalization Construction
CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing SystemsSelf-reflection is a central goal of personal informatics systems, and constructing visualizations from physical tokens has been found to help people reflect on data. However, so far, constructive physicalization has only been studied in lab ...
Comments