Skip to main content

Understanding the Use of Location Sharing Services on Social Networking Platforms in China

  • Conference paper
  • First Online:
E-Business and Telecommunications (ICETE 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 585))

Included in the following conference series:

  • 917 Accesses

Abstract

Along with the development of information communication technology, there are more and more location sharing services on social networking platforms. Although China has the largest number of Internet users in the world, users just started to use location sharing services in the last couple of years. This study aims to have a better understanding of the use of location sharing services on social networking platforms in China. To address this, four research questions are presented and 43 in-depth face-to-face interviews are carried out in China. According to the results, the drivers and barriers for using location sharing services on social networking platforms were identified. Some of the key findings were presented as follows. Firstly, most users were concerned about privacy issues when they were using location sharing services on social networking platforms. Secondly, somewhat surprisingly, some of non-users indicated that they were not aware of the availability of the location sharing services on social networking platforms and they did not know how to use location sharing services. Last but not least, some interviewees wanted to use authority management to deal with private issues raised by the shared location information on social networking platforms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50(2), 179–211 (1991)

    Article  Google Scholar 

  2. Barth, A., Datta, A., Mitchell, J.C., et al.: Privacy and contextual integrity: framework and applications. In: 2006 IEEE Symposium on Security and Privacy, 15 pp. 184–198. IEEE (2006)

    Google Scholar 

  3. Cramer, H., Rost, M., Holmquist, L.E.: Performing a check-in: emerging practices, norms and ‘conflicts’ in location-sharing using foursquare. In: Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, pp. 57–66. ACM (2011)

    Google Scholar 

  4. Davis, F.D.: Perceived usefulness, perceived ease of use and user acceptance of information technology. MIS Q. 13(3), 319–340 (1989)

    Article  Google Scholar 

  5. DeLone, W., McLean, E.: Information systems success: the quest for the dependent variable. Inf. Syst. Res. 3(1), 60–95 (1992)

    Article  Google Scholar 

  6. Fishbein, M., Ajzen, I.: Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Addison-Wesley, Reading (1975)

    Google Scholar 

  7. Gao, S., Krogstie, J.: Understanding business models of mobile ecosystems in China: a case study. In: The Proceedings of the 7th International Conference on Management of Computational and Collective IntElligence in Digital EcoSystems (MEDES 2015). ACM (2015)

    Google Scholar 

  8. Gao, S., Krogstie, J., Siau, K.: Adoption of mobile information services: an empirical study. Mob. Inf. Syst. 10(2), 147–171 (2014)

    Google Scholar 

  9. Gao, S., Krogstie, J., Thingstad, T., et al.: A mobile service using anonymous location-based data: finding reading rooms. Int. J. Inf. Learn. Technol. 32(1), 32–44 (2015)

    Article  Google Scholar 

  10. Gao, S., Krogstie, J., Yang, Y.: Differences in the adoption of smartphones between middle aged adults and older adults in China. In: Zhou, J., Salvendy, G. (eds.) ITAP 2015. LNCS, vol. 9193, pp. 451–462. Springer, Heidelberg (2015)

    Chapter  Google Scholar 

  11. Gao, S., Roinend, P.C., Krogstie, J.: The adoption of mobile tourism services: an empirical study. In: The Proceedings of the 10th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2012), pp. 47–56. ACM (2012)

    Google Scholar 

  12. Gefen, D.: TAM or just plain habit: a look at experienced online shoppers. J. End User Comput. 15(3), 1–13 (2003)

    Article  Google Scholar 

  13. Grodzinsky, F., Tavani, H.T.: Applying the “contextual integrity” model of privacy to personal blogs in the blogoshere (2010)

    Google Scholar 

  14. Horton, R.P., Buck, T., Waterson, P.E., et al.: Explaining intranet use with the technology acceptance model. J. Inf. Technol. 16, 237–249 (2001)

    Article  Google Scholar 

  15. Junglas, I.A., Johnson, N.A., Spitzmüller, C.: Personality traits and concern for privacy: an empirical study in the context of location-based services. Eur. J. Inf. Syst. 17(4), 387–402 (2008)

    Article  Google Scholar 

  16. Kostakos, V., Venkatanathan, J., Reynolds, B., et al.: Who’s your best friend?: targeted privacy attacks In location-sharing social networks. In: Proceedings of the 13th International Conference on Ubiquitous Computing, pp. 177–186. ACM (2011)

    Google Scholar 

  17. Li, M., Zhu, H., Gao, Z., et al.: All your location are belong to us: breaking mobile social networks for automated user location tracking. In: Proceedings of the 15th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 43–52. ACM (2014)

    Google Scholar 

  18. Lin, J., Benisch, M., Sadeh, N., et al.: A comparative study of location-sharing privacy preferences in the United States and China. Pers. Ubiquit. Comput. 17(4), 697–711 (2013)

    Article  Google Scholar 

  19. Lindqvist, J., Cranshaw, J., Wiese, J., et al.: I’m the mayor of my house: examining why people use foursquare-a social-driven location sharing application. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2409–2418. ACM (2011)

    Google Scholar 

  20. Lipford, H.R., Hull, G., Latulipe, C., et al.: Visible flows: contextual integrity and the design of privacy mechanisms on social network sites. In: International Conference on Computational Science and Engineering 2009, (CSE 2009), pp. 985–989. IEEE (2009)

    Google Scholar 

  21. Nissenbaum, H.: Privacy as contextual integrity. Wash. Law Rev. 79(1), 101–139 (2004)

    Google Scholar 

  22. Pavlou, P.A.: Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int. J. Electron. Commerce. 7(3), 101–134 (2003)

    Google Scholar 

  23. Rogers, E.M.: The Diffusion of Innovations. Free Press, New York (1995)

    Google Scholar 

  24. Shi, P., Xu, H., Chen, Y.: Using contextual integrity to examine interpersonal information boundary on social network sites. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 35–38. ACM (2013)

    Google Scholar 

  25. Tsai, J.Y., Kelley, P.G., Cranor, L.F., et al.: Location-sharing technologies: privacy risks and controls. ISJLP 6, 119 (2010)

    Google Scholar 

  26. Venkatesh, V., Morris, M.G., Davis, G.B., et al.: User acceptance of information technology: toward a unified view. MIS Q. 27(3), 425–478 (2003)

    Google Scholar 

  27. Xu, H., Gupta, S.: The effects of privacy concerns and personal innovativeness on potential and experienced customers’ adoption of location-based services. Electron. Markets 19(2–3), 137–149 (2009)

    Article  Google Scholar 

  28. Zhou, T.: Examining location-based services usage from the perspectives of unified theory of acceptance and use of technology and privacy risk. J. Electron. Commer. Res. 13(2), 135–144 (2012)

    Google Scholar 

  29. Zhu, C., Wat, K.K., Fang, B., et al.: Privacy and social effects in location sharing services. In: 2012 IEEE First International Conference on Services Economics (SE), pp. 62–65. IEEE (2012)

    Google Scholar 

  30. Zimmer, M.: Privacy on planet Google: using the theory of contextual integrity to clarify the privacy threats of Google’s quest for the perfect search engine. J. Bus. Tech. L. 3, 109 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shang Gao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Gao, S., Zhang, X. (2016). Understanding the Use of Location Sharing Services on Social Networking Platforms in China. In: Obaidat, M., Lorenz, P. (eds) E-Business and Telecommunications. ICETE 2015. Communications in Computer and Information Science, vol 585. Springer, Cham. https://doi.org/10.1007/978-3-319-30222-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-30222-5_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-30221-8

  • Online ISBN: 978-3-319-30222-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics