Understanding the Use of Location Sharing Services on Social Networking Platforms in China

Along with the development of information communication technology, there are more and more location sharing services on social networking platforms. Although China has the largest number of Internet users in the world, users just started to use location sharing services in the last couple of years. This study aims to have a better understanding of the use of location sharing services on social networking platforms in China. To address this, four research questions are presented and 43 in-depth face-to-face interviews are carried out in China. According to the results, the drivers and barriers for using location sharing services on social networking platforms were identified. Some of the key findings were presented as follows. Firstly, most users were concerned about privacy issues when they were using location sharing services on social networking platforms. Secondly, somewhat surprisingly, some of non-users indicated that they were not aware of the availability of the location sharing services on social networking platforms and they did not know how to use location sharing services. Last but not least, some interviewees wanted to use authority management to deal with private issues raised by the shared location information on social networking platforms.

[1]  Henriette Cramer,et al.  Performing a check-in: emerging practices, norms and 'conflicts' in location-sharing using foursquare , 2011, Mobile HCI.

[2]  Vassilis Kostakos,et al.  Who's your best friend?: targeted privacy attacks In location-sharing social networks , 2011, UbiComp '11.

[3]  Sumeet Gupta,et al.  The effects of privacy concerns and personal innovativeness on potential and experienced customers’ adoption of location-based services , 2009, Electron. Mark..

[4]  I. Ajzen The theory of planned behavior , 1991 .

[5]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[6]  John Krogstie,et al.  Differences in the Adoption of Smartphones Between Middle Aged Adults and Older Adults in China , 2015, HCI.

[7]  Keng Siau,et al.  Adoption of mobile information services: An empirical study , 2014, Mob. Inf. Syst..

[8]  Ephraim R. McLean,et al.  Information Systems Success: The Quest for the Dependent Variable , 1992, Inf. Syst. Res..

[9]  Helen Nissenbaum,et al.  Privacy and contextual integrity: framework and applications , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[10]  Michael Zimmer Privacy on Planet Google: Using the Theory of "Contextual Integrity" to Clarify the Privacy Threats of Google's Quest for the Perfect Search Engine , 2008 .

[11]  Herman T. Tavani,et al.  Applying the “Contextual Integrity” Model of Privacy to Personal Blogs in the Blogoshere , 2010 .

[12]  Haojin Zhu,et al.  All your location are belong to us: breaking mobile social networks for automated user location tracking , 2013, MobiHoc '14.

[13]  Celine Latulipe,et al.  Visible Flows: Contextual Integrity and the Design of Privacy Mechanisms on Social Network Sites , 2009, 2009 International Conference on Computational Science and Engineering.

[14]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[15]  Chris W. Clegg,et al.  Explaining intranet use with the technology acceptance model , 2001, J. Inf. Technol..

[16]  David Gefen,et al.  TAM or Just Plain Habit: A Look at Experienced Online Shoppers , 2003, J. Organ. End User Comput..

[17]  John Krogstie,et al.  A mobile service using anonymous location-based data: finding reading rooms , 2015 .

[18]  John Krogstie,et al.  Understanding business models of mobile ecosystems in China: a case study , 2015, MEDES.

[19]  Yunan Chen,et al.  Using contextual integrity to examine interpersonal information boundary on social network sites , 2013, CHI.

[20]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[21]  Kai Kwong Wat,et al.  Privacy and Social Effects in Location Sharing Services , 2012, 2012 IEEE First International Conference on Services Economics.

[22]  Tao Zhou,et al.  Examining Location-Based Services Usage from the Perspectives of Unified Theory of Acceptance and Use of Technology and Privacy Risk , 2012 .

[23]  Lorrie Faith Cranor,et al.  Location-Sharing Technologies: Privacy Risks and Controls , 2009 .

[24]  John Krogstie,et al.  The adoption of mobile tourism services: an empirical study , 2012, MoMM '12.

[25]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[26]  Paul A. Pavlou,et al.  Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..

[27]  Norman A. Johnson,et al.  Personality traits and concern for privacy: an empirical study in the context of location-based services , 2008, Eur. J. Inf. Syst..

[28]  Norman M. Sadeh,et al.  A comparative study of location-sharing privacy preferences in the United States and China , 2012, Personal and Ubiquitous Computing.

[29]  E. Rogers,et al.  Diffusion of Innovations , 1964 .

[30]  John Zimmerman,et al.  I'm the mayor of my house: examining why people use foursquare - a social-driven location sharing application , 2011, CHI.