Reflection or action?: how feedback and control affect location sharing decisions

Owing to the ever-expanding size of social and professional networks, it is becoming cumbersome for individuals to configure information disclosure settings. We used location sharing systems to unpack the nature of discrepancies between a person's disclosure settings and contextual choices. We conducted an experience sampling study (N = 35) to examine various factors contributing to such divergence. We found that immediate feedback about disclosures without any ability to control the disclosures evoked feelings of oversharing. Moreover, deviation from specified settings did not always signal privacy violation; it was just as likely that settings prevented information disclosure considered permissible in situ. We suggest making feedback more actionable or delaying it sufficiently to avoid a knee-jerk reaction. Our findings also make the case for proactive techniques for detecting potential mismatches and recommending adjustments to disclosure settings, as well as selective control when sharing location with socially distant recipients and visiting atypical locations.

[1]  Lorrie Faith Cranor,et al.  Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs , 2011, Personal and Ubiquitous Computing.

[2]  Tara Matthews,et al.  Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.

[3]  M. Khan,et al.  SOCIOLINGVISTIKA/ SOCIOLINGUISTICS Academic Sojourners, Culture Shock and Intercultural Adaptation: a Trend Analysis , 2007 .

[4]  Jason I. Hong,et al.  Field Deployment of IMBuddy : A Study of Privacy Control and Feedback Mechanisms for Contextual IM , 2007, UbiComp.

[5]  Tristan Henderson,et al.  Privacy in Location-Aware Computing Environments , 2007, IEEE Pervasive Computing.

[6]  Deirdre K. Mulligan,et al.  Geopriv Requirements , 2004, RFC.

[7]  Alfred Kobsa,et al.  Preference-based location sharing: are more privacy options really better? , 2013, CHI.

[8]  Nigel Davies,et al.  Preserving Privacy in Environments with Location-Based Applications , 2003, IEEE Pervasive Comput..

[9]  Lorrie Faith Cranor,et al.  Understanding and capturing people’s privacy policies in a mobile social networking application , 2009, Personal and Ubiquitous Computing.

[10]  Sameer Patil,et al.  Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice , 2012, SOUPS.

[11]  Lorrie Faith Cranor,et al.  Who's viewed you?: the impact of feedback in a mobile location-sharing application , 2009, CHI.

[12]  Ashraf Khalil,et al.  Context-aware telephony: privacy preferences and sharing patterns , 2006, CSCW '06.

[13]  Adam J. Lee,et al.  Eyeing your exposure: quantifying and controlling information sharing for improved privacy , 2011, SOUPS.

[14]  Gregory D. Abowd,et al.  Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service , 2005, UbiComp.

[15]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[16]  Lorrie Faith Cranor,et al.  Empirical models of privacy in location sharing , 2010, UbiComp.

[17]  Sameer Patil,et al.  Who gets to know what when: configuring privacy permissions in an awareness application , 2005, CHI.

[18]  John Zimmerman,et al.  Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share , 2011, UbiComp '11.

[19]  Hassan Takabi,et al.  Exploring reactive access control , 2010, CHI Extended Abstracts.

[20]  M. Csíkszentmihályi,et al.  The Experience Sampling Method , 2014 .

[21]  Peter Steenkiste,et al.  Implementing access control to people location information , 2004, SACMAT '04.

[22]  Xin Shuai,et al.  Loose tweets: an analysis of privacy leaks on twitter , 2011, WPES.

[23]  Adam J. Lee,et al.  When privacy and utility are in harmony: towards better design of presence technologies , 2012, Personal and Ubiquitous Computing.

[24]  Adam J. Lee,et al.  PlexC: a policy language for exposure control , 2012, SACMAT '12.

[25]  Yang Wang,et al.  "I regretted the minute I pressed share": a qualitative study of regrets on Facebook , 2011, SOUPS.

[26]  Brian P. Bailey,et al.  Understanding changes in mental workload during execution of goal-directed tasks and its application for interruption management , 2008, TCHI.