Results 1 - 10
of
76
Location disclosure to social relations: Why, when, & what people want to share
- In Proc. CHI
, 2005
"... Advances in location-enhanced technology are making it easier for us to be located by others. These new technologies present a difficult privacy tradeoff, as disclosing one’s location to another person or service could be risky, yet valuable. To explore whether and what users are willing to disclose ..."
Abstract
-
Cited by 193 (4 self)
- Add to MetaCart
(Show Context)
Advances in location-enhanced technology are making it easier for us to be located by others. These new technologies present a difficult privacy tradeoff, as disclosing one’s location to another person or service could be risky, yet valuable. To explore whether and what users are willing to disclose about their location to social relations, we conducted a three-phased formative study. Our results show that the most important factors were who was requesting, why the requester wanted the participant’s location, and what level of detail would be most useful to the requester. After determining these, participants were typically willing to disclose either the most useful detail or nothing about their location. From our findings, we reflect on the decision process for location disclosure. With these results, we hope to influence the design of future locationenhanced applications and services. ACM Classification Keywords
From awareness to repartee: sharing location within social groups. CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems
, 2008
"... This paper investigates emergent practices around ‘microblogging’, changing and sharing status within a social group. We present results from a trial of ‘Connecto’, a phone based status and location sharing application that allows a group to ‘tag ’ areas and have individuals ’ locations shared autom ..."
Abstract
-
Cited by 77 (4 self)
- Add to MetaCart
(Show Context)
This paper investigates emergent practices around ‘microblogging’, changing and sharing status within a social group. We present results from a trial of ‘Connecto’, a phone based status and location sharing application that allows a group to ‘tag ’ areas and have individuals ’ locations shared automatically on a mobile phone. In use the system moved beyond being an awareness tool to a way of continuing the ongoing ‘story’ of conversations within the group. Through sharing status and location the system supported each groups ’ ongoing repartee- a site for social exchange, enjoyment and friendship.
Place-Its: A Study of Location-Based Reminders on Mobile Phones
- In Ubicomp
, 2005
"... Abstract. Context-awareness can improve the usefulness of automated reminders. However, context-aware reminder applications have yet to be evaluated throughout a person’s daily life. Mobile phones provide a potentially convenient and truly ubiquitous platform for the detection of personal context su ..."
Abstract
-
Cited by 70 (3 self)
- Add to MetaCart
(Show Context)
Abstract. Context-awareness can improve the usefulness of automated reminders. However, context-aware reminder applications have yet to be evaluated throughout a person’s daily life. Mobile phones provide a potentially convenient and truly ubiquitous platform for the detection of personal context such as location, as well as the delivery of reminders. We designed Place-Its, a location-based reminder application that runs on mobile phones, to study people using location-aware reminders throughout their daily lives. We describe the design of Place-Its and a two-week exploratory user study. The study reveals that location-based reminders are useful, in large part because people use location in nuanced ways. 1
Who’s Viewed You? The Impact of Feedback in a mobile location Sharing System
"... Feedback is viewed as an essential element of ubiquitous computing systems in the HCI literature for helping people manage their privacy. However, the success of online social networks and existing commercial systems for mobile location sharing which do not incorporate feedback would seem to call th ..."
Abstract
-
Cited by 63 (10 self)
- Add to MetaCart
(Show Context)
Feedback is viewed as an essential element of ubiquitous computing systems in the HCI literature for helping people manage their privacy. However, the success of online social networks and existing commercial systems for mobile location sharing which do not incorporate feedback would seem to call the importance of feedback into question. We investigated this issue in the context of a mobile location sharing system. Specifically, we report on the findings of a field deployment of Locyoution, a mobile location sharing system. In our study, (n = 56), one group was given feedback in the form of a history of location requests, and a second group was given no feedback at all. Our major contribution has been to show that feedback is an important contributing factor towards improving user comfort levels and allaying privacy concerns. Participants ’ privacy concerns were reduced after using the mobile location sharing system. Additionally, our study suggests that peer opinion and technical savviness contribute most to whether or not participants thought they would continue to use a mobile location technology. Author Keywords Context-awareness, mobile location sharing technology, mobile
Locating Family Values: A Field Trial of the Whereabouts Clock
- In Proc. UbiComp’07
"... Abstract. We report the results of a long-term, multi-site field trial of a situated awareness device for families called the “Whereabouts Clock”. The Clock displayed family members ’ current location as one of four privacy-preserving, deliberately coarse-grained categories (HOME, WORK, SCHOOL or EL ..."
Abstract
-
Cited by 57 (5 self)
- Add to MetaCart
(Show Context)
Abstract. We report the results of a long-term, multi-site field trial of a situated awareness device for families called the “Whereabouts Clock”. The Clock displayed family members ’ current location as one of four privacy-preserving, deliberately coarse-grained categories (HOME, WORK, SCHOOL or ELSEWHERE). In use, the Clock supported not only family co-ordination but also more emotive aspects of family life such as reassurance, connectedness, identity and social touch. This emphasized aspects of family life frequently neglected in Ubicomp, such as the ways in which families ’ awareness of each others’ activities contributes to a sense of a family’s identity. We draw further on the results to differentiate between location as a technical aspect of awareness systems and what we characterize as “location-in-interaction”. Location-ininteraction is revealed as an emotional, accountable and even moral part of family life. 1
Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications
- In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI
, 2006
"... The emergence of location-based computing promises new and compelling applications, but raises very real privacy risks. Existing approaches to privacy generally treat people as the entity of interest, often using a fidelity tradeoff to manage the costs and benefits of revealing a person’s location. ..."
Abstract
-
Cited by 41 (10 self)
- Add to MetaCart
The emergence of location-based computing promises new and compelling applications, but raises very real privacy risks. Existing approaches to privacy generally treat people as the entity of interest, often using a fidelity tradeoff to manage the costs and benefits of revealing a person’s location. However, these approaches cannot be applied in some applications, as a reduction in precision can render location information useless. This is true of a category of applications that use location data collected from multiple people to infer such information as whether there is a traffic jam on a bridge, whether there are seats available in a nearby coffee shop, when the next bus will arrive, or if a particular conference room is currently empty. We present hitchhiking, a new approach that treats locations as the primary entity of interest. Hitchhiking removes the fidelity tradeoff by preserving the anonymity of reports without reducing the precision of location disclosures. We can therefore support the full functionality of an interesting class of location-based applications without introducing the privacy concerns that would otherwise arise.
Capturing Location-Privacy Preferences: Quantifying Accuracy and User-Burden Tradeoffs
, 2010
"... We present a three-week user study in which we tracked the locations of 27 subjects and asked them to rate when, where, and with whom they would have been comfortable sharing their locations. The results of analysis conducted on over 7,500 hours of data suggest that the user population represented b ..."
Abstract
-
Cited by 41 (15 self)
- Add to MetaCart
(Show Context)
We present a three-week user study in which we tracked the locations of 27 subjects and asked them to rate when, where, and with whom they would have been comfortable sharing their locations. The results of analysis conducted on over 7,500 hours of data suggest that the user population represented by our subjects has rich location-privacy preferences, with a number of critical dimensions, including time of day, day of week, and location. We describe a methodology for quantifying the effects, in terms of accuracy and amount of information shared, of privacy-setting types with differing levels of complexity (e.g., setting types that allow users to specify location- and/or time-based rules). Using the detailed preferences we collected, we identify the best possible policy (or collection of rules granting access to one’s location) for each subject and privacy-setting type. We measure the accuracy with which the resulting policies are able to capture our subjects ’ privacy preferences under a variety of assumptions about the sensitivity of the information and user-burden tolerance. One practical implication of our results is that today’s location sharing applications may have failed to gain much traction due to their limited privacy settings, as they appear to be ineffective at capturing the preferences revealed by our study.
Keeping ubiquitous computing to yourself: a practical model for user control of privacy
- International Journal of Human-Computer Studies
, 2005
"... As with all the major advances in information and communication technology, ubiquitous computing (ubicomp) introduces new risks to individual privacy. Our analysis of privacy protection in ubicomp has identified four layers through which users must navigate: the regulatory regime they are currently ..."
Abstract
-
Cited by 33 (5 self)
- Add to MetaCart
(Show Context)
As with all the major advances in information and communication technology, ubiquitous computing (ubicomp) introduces new risks to individual privacy. Our analysis of privacy protection in ubicomp has identified four layers through which users must navigate: the regulatory regime they are currently in, the type of ubicomp service required, the type of data being disclosed, and their personal privacy policy. We illustrate and compare the protection afforded by regulation and by some major models for user control of privacy. We identify the shortcomings of each and propose a model which allows user control of privacy levels in a ubicomp environment. Our model balances the user’s privacy preferences against the applicable privacy regulations and incorporates five types of user controlled “noise ” to protect location privacy by introducing ambiguities. We also incorporate an economics-based approach to assist users in balancing the trade-offs between giving up privacy and receiving ubicomp services. We conclude with a scenario and heuristic evaluation which suggests that regulation can have both positive and negative influences on privacy interfaces in ubicomp and that social translucence is an important heuristic for ubicomp privacy interface functionality.
PeopleTones: A System for the Detection and Notification of Buddy Proximity on Mobile Phones
- In Proc. 6th Int’l. Conf. on Mobile Systems (MobiSys
, 2008
"... Mobile phones have the potential to be useful agents for their owners by detecting and reporting situations that are of interest. Several challenges emerge in the case of detecting and reporting “nice to know ” situations. Being alerted of these events may not be of critical importance but may be us ..."
Abstract
-
Cited by 28 (3 self)
- Add to MetaCart
(Show Context)
Mobile phones have the potential to be useful agents for their owners by detecting and reporting situations that are of interest. Several challenges emerge in the case of detecting and reporting “nice to know ” situations. Being alerted of these events may not be of critical importance but may be useful if the user is not busy. For detection, the precision of sensing must be high enough to minimize annoying false notifications, despite the constraints imposed by the inaccuracy of commodity sensors and the limited battery power available on mobile phones. For reporting, the notifications cannot be too obtrusive to the user or those in the vicinity. Peripheral cues are appropriate for conveying information like proximity, but have been studied primarily in settings like offices where sensors and cueing mechanisms can be controlled. We explore these issues through the design of PeopleTones, a buddy proximity application for mobile phones. We contribute (1) an algorithm for detecting proximity, (2) techniques for reducing sensor noise and power consumption, and (3) a method for generating peripheral cues. Empirical measurements demonstrate the precision and recall characteristics of our proximity algorithm. A two-week study of three groups of friends using PeopleTones shows that our techniques were effective, enabling the study of how people respond to peripheral cues in the wild. Our qualitative findings underscore the importance of cue selection and personal control for peripheral cues.
Cluestr: Mobile Social Networking for Enhanced Group Communication
"... Recent technological advances foster the spreading of social software in the mobile domain. Hence, future usage patterns of mobile devices will involve more group interaction. While collaboration using mobile devices is an active area of research, only limited attention has been paid to the efficien ..."
Abstract
-
Cited by 17 (0 self)
- Add to MetaCart
(Show Context)
Recent technological advances foster the spreading of social software in the mobile domain. Hence, future usage patterns of mobile devices will involve more group interaction. While collaboration using mobile devices is an active area of research, only limited attention has been paid to the efficient initiation of group communication from mobile terminals. In this paper we present a community-aware mechanism that allows to efficiently select contacts in order to address them as a group. We have integrated the proposed method into a proof-of-concept application, and present preliminary experiments that demonstrate the accuracy of the approach and show significant time savings in the group initialization process.