sometimes less is more: multi-perspective exploration of disclosure abstractions in location-aware social mobile applications

In the past few years, there has been increasing interest in deploying social location-sharing applications (LSAs) that enable users to continuously sense, collect, and share their location information with others. Yet, despite all the attention LSAs are receiving, studies have found that only a small percentage of mobile consumers actively use these services. One often-cited adoption barrier is that many LSAs do not adequately address end-user privacy concerns for sharing location data. One way to address these privacy concerns is to incorporate support for disclosure abstractions in LSAs. These abstractions provide a middle-ground compromise that provides some degree of privacy protection for end-users, as well as some degree of social value to the users who are consuming the location information. In this dissertation, we look at two specific kinds of abstractions: geographic abstractions (which provide spatial blurring of one's location) and semantic abstractions (which provide obfuscation by referring to the type of location a place is, rather than by its geographical coordinates). We present results from several studies that examine these abstractions at four different stages: how users reason about location sharing, how users configure their privacy preferences, how users interpret visual representations of their location, and what kinds of outcomes can be expected from users that share abstractions. Based on these studies, we provide empirical evidence that relatively simple privacy mechanisms like disclosure abstractions can simplify rule-based privacy configurations and increase the likelihood of location sharing, though there is still a significant chance that abstractions can be reverse-engineered. Based on qualitative user feedback, we also present several privacy implications for visualizing location information as well. By studying these issues with different types of location sharing applications as well as different user study methodologies, we provide a multi-perspective exploration of end-user privacy concerns regarding general location sharing behaviors for context-aware social mobile applications.

[1]  Wendy A. Kellogg,et al.  Socially translucent systems: social proxies, persistent conversation, and the design of “babble” , 1999, CHI '99.

[2]  Debby Hindus,et al.  Ubiquitous audio: capturing spontaneous collaboration , 1992, CSCW '92.

[3]  Loren G. Terveen,et al.  Sharescape: an interface for place annotation , 2008, NordiCHI.

[4]  Cliff Lampe,et al.  A face(book) in the crowd: social Searching vs. social browsing , 2006, CSCW '06.

[5]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[6]  Bill N. Schilit,et al.  Privacy and Security in the Location-enhanced World Wide Web , 2003 .

[7]  Norman M. Sadeh,et al.  Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing , 2010, UbiComp.

[8]  P. Resnick Beyond Bowling Together: SocioTechnical Capital , 2001 .

[9]  Lorrie Faith Cranor,et al.  Who's viewed you?: the impact of feedback in a mobile location-sharing application , 2009, CHI.

[10]  James A. Landay,et al.  An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.

[11]  Mika Raento,et al.  ContextContacts: re-designing SmartPhone's contact book to support mobile awareness and collaboration , 2005, Mobile HCI.

[12]  Fredrik Espinoza,et al.  GeoNotes: Social and Navigational Aspects of Location-Based Information Systems , 2001, UbiComp.

[13]  Peter F. Patel-Schneider,et al.  Enabling context-aware and privacy-conscious user data sharing , 2004, IEEE International Conference on Mobile Data Management, 2004. Proceedings. 2004.

[14]  Lorrie Faith Cranor,et al.  Location-Sharing Technologies: Privacy Risks and Controls , 2009 .

[15]  Frank Bentley,et al.  Sharing motion information with close family and friends , 2007, CHI.

[16]  Georg Treu,et al.  Implicit Authorization for Accessing Location Data in a Social Context , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[17]  Mohamed F. Mokbel,et al.  Privacy in Location-Based Services: State-of-the-Art and Research Directions , 2007, 2007 International Conference on Mobile Data Management.

[18]  Ponnurangam Kumaraguru,et al.  Privacy Indexes: A Survey of Westin's Studies , 2005 .

[19]  Eyal de Lara,et al.  Are GSM Phones THE Solution for Localization? , 2006, Seventh IEEE Workshop on Mobile Computing Systems & Applications (WMCSA'06 Supplement).

[20]  Lorrie Faith Cranor,et al.  Understanding and capturing people’s privacy policies in a mobile social networking application , 2009, Personal and Ubiquitous Computing.

[21]  Anind K. Dey,et al.  Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns , 2003, INTERACT.

[22]  Ninghui Li,et al.  End-User Privacy in Human–Computer Interaction , 2009 .

[23]  Kori Inkpen Quinn,et al.  "Need to Know": Examining Information Need in Location Discourse , 2006, Pervasive.

[24]  Tara Matthews,et al.  Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.

[25]  James A. Landay,et al.  Personal privacy through understanding and action: five pitfalls for designers , 2004, Personal and Ubiquitous Computing.

[26]  Shelly D. Farnham,et al.  Swarm: Text messaging designed to enhance social coordination , 2005 .

[27]  Lujo Bauer,et al.  User-Controllable Security and Privacy for Pervasive Computing , 2007 .

[28]  Marco Gruteser,et al.  Protecting privacy, in continuous location-tracking applications , 2004, IEEE Security & Privacy Magazine.

[29]  Bill N. Schilit,et al.  Place Lab: Device Positioning Using Radio Beacons in the Wild , 2005, Pervasive.

[30]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[31]  Danah Boyd,et al.  Friendster and publicly articulated social networking , 2004, CHI EA '04.

[32]  Loren Terveen,et al.  Talking about Place: An Experiment in How People Describe Places ¤ , 2005 .

[33]  Shelly Farnham,et al.  Swarm: Hyper Awareness, Micro Coordination, and Smart Convergence through Mobile Group Text Messaging , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[34]  B. Depaulo,et al.  Everyday lies in close and casual relationships. , 1998, Journal of personality and social psychology.

[35]  Judith Donath,et al.  Public Displays of Connection , 2004 .

[36]  John Krumm,et al.  Accuracy characterization for metropolitan-scale Wi-Fi localization , 2005, MobiSys '05.

[37]  Matthew Chalmers,et al.  From awareness to repartee: sharing location within social groups , 2008, CHI.

[38]  Alessandro Acquisti,et al.  Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.

[39]  Colin Ware,et al.  Information Visualization: Perception for Design , 2000 .

[40]  Lorrie Faith Cranor,et al.  The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing , 2009, SOUPS.

[41]  Jason I. Hong,et al.  Field Deployment of IMBuddy : A Study of Privacy Control and Feedback Mechanisms for Contextual IM , 2007, UbiComp.

[42]  Roy Want You're Not Paranoid; They Really Are Watching You! , 2007, IEEE Pervasive Comput..

[43]  E. Laurier Why People Say Where They are during Mobile Phone Calls , 2001 .

[44]  Paul Dourish,et al.  Re-place-ing space: the roles of place and space in collaborative systems , 1996, CSCW '96.

[45]  Xiao-lei Chen,et al.  [The relationship between tumor suppressor genes p14ARF and p53 expression and biological behavior of pancreatic carcinoma]. , 2003, Zhonghua yi xue za zhi.

[46]  Andrew J. May,et al.  Pedestrian navigation aids: information requirements and design implications , 2003, Personal and Ubiquitous Computing.

[47]  Gregory D. Abowd,et al.  Developing privacy guidelines for social location disclosure applications and services , 2005, SOUPS '05.

[48]  Jenna Burrell,et al.  E-graffiti: evaluating real-world use of a context-aware system , 2002, Interact. Comput..

[49]  Allan Ahlberg Who Knows? , 1999, Security Protocols Workshop.

[50]  Anind K. Dey,et al.  Who wants to know what when? privacy preference determinants in ubiquitous computing , 2003, CHI Extended Abstracts.

[51]  Keith N. Hampton,et al.  Does the Internet Increase, Decrease, or Supplement Social Capital? , 2001 .

[52]  Eija Kaasinen,et al.  User needs for location-aware mobile services , 2003, Personal and Ubiquitous Computing.

[53]  Debby Hindus,et al.  Casablanca: designing social communication devices for the home , 2001, CHI 2001.

[54]  Jonathan Steinberg,et al.  All or nothing : the Axis and the Holocaust, 1941-1943 , 1990 .

[55]  Chris Schmandt,et al.  Location-Aware Information Delivery with ComMotion , 2000, HUC.

[56]  Ravi Kumar,et al.  "I know what you did last summer": query logs and user privacy , 2007, CIKM '07.

[57]  Mark Zuckerberg Thoughts on Beacon , 2007 .

[58]  R. Harper Why people do and don't wear active badges: a case study , 1995 .

[59]  Pierangela Samarati,et al.  Location privacy in pervasive computing , 2008 .

[60]  Marc Langheinrich,et al.  A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.

[61]  James A. Landay,et al.  Privacy risk models for designing privacy-sensitive ubiquitous computing systems , 2004, DIS '04.

[62]  Mika Raento,et al.  Interpreting and Acting on Mobile Awareness Cues , 2007, Hum. Comput. Interact..

[63]  Cliff Lampe,et al.  The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..

[64]  Alex S. Taylor,et al.  Locating Family Values: A Field Trial of the Whereabouts Clock , 2007, UbiComp.

[65]  Lujo Bauer,et al.  A user study of policy creation in a flexible access-control system , 2008, CHI.

[66]  James A. Landay,et al.  Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.

[67]  Louise Barkhuus Privacy in Location-Based Services , Concern vs . Coolness , 2004 .

[68]  Ashraf Khalil,et al.  Context-aware telephony: privacy preferences and sharing patterns , 2006, CSCW '06.

[69]  James T. Enns,et al.  Visualizing real-time multivariate data using preattentive processing , 1995, TOMC.

[70]  Elizabeth D. Mynatt,et al.  Privacy Mirrors: Understanding and Shaping Socio-technical Ubiquitous Computing Systems , 2002 .

[71]  Tristan Henderson,et al.  Privacy in Location-Aware Computing Environments , 2007, IEEE Pervasive Computing.

[72]  Gregory D. Abowd,et al.  Social Disclosure of Place: From Location Technology to Communication Practices , 2005, Pervasive.

[73]  Gregory D. Abowd,et al.  The Family Intercom: Developing a Context-Aware Audio Communication System , 2001, UbiComp.

[74]  Per Persson,et al.  DeDe: design and evaluation of a context-enhanced mobile messaging system , 2005, CHI.

[75]  Loren G. Terveen,et al.  Capturing, sharing, and using local place information , 2007, CHI.

[76]  John C. Tang,et al.  ConNexus to awarenex: extending awareness to mobile users , 2001, CHI.

[77]  James Fogarty,et al.  Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications , 2006, CHI.

[78]  William G. Griswold,et al.  Challenge: ubiquitous location-aware computing and the "place lab" initiative , 2003, WMASH '03.

[79]  Marc Smith,et al.  Where were we: communities for sharing space-time trails , 2007, GIS.

[80]  Scott E. Hudson,et al.  Improving the match between callers and receivers: A study on the effect of contextual information on cell phone interruptions , 2007, Behav. Inf. Technol..

[81]  Jason Hong,et al.  Towards Everyday Privacy for Ubiquitous Computing , 2003 .

[82]  Kumiko Aoki,et al.  An analysis of young people's use of and attitudes toward cell phones , 2003, Telematics Informatics.

[83]  Gregory D. Abowd,et al.  Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service , 2005, UbiComp.

[84]  Marco Gruteser,et al.  USENIX Association , 1992 .

[85]  Ben Shneiderman,et al.  Readings in information visualization - using vision to think , 1999 .

[86]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[87]  Alexandra Weilenmann,et al.  “I Can't Talk Now, I'm in a Fitting Room”: Formulating Availability and Location in Mobile-Phone Conversations , 2003 .

[88]  Alessandro Acquisti,et al.  Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.

[89]  Norman M. Sadeh,et al.  Modeling people's place naming preferences in location sharing , 2010, UbiComp.

[90]  Richard Harper,et al.  Why people do and don't wear active badges: A case study , 1995, Computer Supported Cooperative Work (CSCW).

[91]  Mike Y. Chen,et al.  Practical Metropolitan-Scale Positioning for GSM Phones , 2006, UbiComp.

[92]  Anne Adams,et al.  Multimedia information changes the whole privacy ballgame , 2000, CFP '00.

[93]  Allison Woodruff,et al.  Making space for stories: ambiguity in the design of personal communication systems , 2005, CHI.

[94]  Alessandro Acquisti,et al.  Nudging Privacy: The Behavioral Economics of Personal Information , 2009, IEEE Security & Privacy.

[95]  Mark S. Ackerman,et al.  Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.

[96]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[97]  Jonathan Grudin Presenting choices in context: approaches to information sharing , 2003 .

[98]  Martin Colbert,et al.  A diary study of rendezvousing: implications for position-aware computing and communications for the general public , 2001, GROUP.

[99]  Dan Frankowski,et al.  Because I carry my cell phone anyway: functional location-based reminder applications , 2006, CHI.

[100]  Mark Zuckerberg,et al.  An Open Letter from Mark Zuckerberg , 2006 .

[101]  James D. Hollan,et al.  A diary study of mobile information needs , 2008, CHI.

[102]  Bonnie A. Nardi,et al.  Interaction and outeraction: instant messaging in action , 2000, CSCW '00.

[103]  Chris Schmandt,et al.  WatchMe: Communication and Awareness Between Members of a Closely-Knit Group , 2004, UbiComp.