Abstract
Along with the development of information communication technology, there are more and more location sharing services on social networking platforms. Although China has the largest number of Internet users in the world, users just started to use location sharing services in the last couple of years. This study aims to have a better understanding of the use of location sharing services on social networking platforms in China. To address this, four research questions are presented and 43 in-depth face-to-face interviews are carried out in China. According to the results, the drivers and barriers for using location sharing services on social networking platforms were identified. Some of the key findings were presented as follows. Firstly, most users were concerned about privacy issues when they were using location sharing services on social networking platforms. Secondly, somewhat surprisingly, some of non-users indicated that they were not aware of the availability of the location sharing services on social networking platforms and they did not know how to use location sharing services. Last but not least, some interviewees wanted to use authority management to deal with private issues raised by the shared location information on social networking platforms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50(2), 179–211 (1991)
Barth, A., Datta, A., Mitchell, J.C., et al.: Privacy and contextual integrity: framework and applications. In: 2006 IEEE Symposium on Security and Privacy, 15 pp. 184–198. IEEE (2006)
Cramer, H., Rost, M., Holmquist, L.E.: Performing a check-in: emerging practices, norms and ‘conflicts’ in location-sharing using foursquare. In: Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, pp. 57–66. ACM (2011)
Davis, F.D.: Perceived usefulness, perceived ease of use and user acceptance of information technology. MIS Q. 13(3), 319–340 (1989)
DeLone, W., McLean, E.: Information systems success: the quest for the dependent variable. Inf. Syst. Res. 3(1), 60–95 (1992)
Fishbein, M., Ajzen, I.: Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Addison-Wesley, Reading (1975)
Gao, S., Krogstie, J.: Understanding business models of mobile ecosystems in China: a case study. In: The Proceedings of the 7th International Conference on Management of Computational and Collective IntElligence in Digital EcoSystems (MEDES 2015). ACM (2015)
Gao, S., Krogstie, J., Siau, K.: Adoption of mobile information services: an empirical study. Mob. Inf. Syst. 10(2), 147–171 (2014)
Gao, S., Krogstie, J., Thingstad, T., et al.: A mobile service using anonymous location-based data: finding reading rooms. Int. J. Inf. Learn. Technol. 32(1), 32–44 (2015)
Gao, S., Krogstie, J., Yang, Y.: Differences in the adoption of smartphones between middle aged adults and older adults in China. In: Zhou, J., Salvendy, G. (eds.) ITAP 2015. LNCS, vol. 9193, pp. 451–462. Springer, Heidelberg (2015)
Gao, S., Roinend, P.C., Krogstie, J.: The adoption of mobile tourism services: an empirical study. In: The Proceedings of the 10th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2012), pp. 47–56. ACM (2012)
Gefen, D.: TAM or just plain habit: a look at experienced online shoppers. J. End User Comput. 15(3), 1–13 (2003)
Grodzinsky, F., Tavani, H.T.: Applying the “contextual integrity” model of privacy to personal blogs in the blogoshere (2010)
Horton, R.P., Buck, T., Waterson, P.E., et al.: Explaining intranet use with the technology acceptance model. J. Inf. Technol. 16, 237–249 (2001)
Junglas, I.A., Johnson, N.A., Spitzmüller, C.: Personality traits and concern for privacy: an empirical study in the context of location-based services. Eur. J. Inf. Syst. 17(4), 387–402 (2008)
Kostakos, V., Venkatanathan, J., Reynolds, B., et al.: Who’s your best friend?: targeted privacy attacks In location-sharing social networks. In: Proceedings of the 13th International Conference on Ubiquitous Computing, pp. 177–186. ACM (2011)
Li, M., Zhu, H., Gao, Z., et al.: All your location are belong to us: breaking mobile social networks for automated user location tracking. In: Proceedings of the 15th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 43–52. ACM (2014)
Lin, J., Benisch, M., Sadeh, N., et al.: A comparative study of location-sharing privacy preferences in the United States and China. Pers. Ubiquit. Comput. 17(4), 697–711 (2013)
Lindqvist, J., Cranshaw, J., Wiese, J., et al.: I’m the mayor of my house: examining why people use foursquare-a social-driven location sharing application. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2409–2418. ACM (2011)
Lipford, H.R., Hull, G., Latulipe, C., et al.: Visible flows: contextual integrity and the design of privacy mechanisms on social network sites. In: International Conference on Computational Science and Engineering 2009, (CSE 2009), pp. 985–989. IEEE (2009)
Nissenbaum, H.: Privacy as contextual integrity. Wash. Law Rev. 79(1), 101–139 (2004)
Pavlou, P.A.: Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int. J. Electron. Commerce. 7(3), 101–134 (2003)
Rogers, E.M.: The Diffusion of Innovations. Free Press, New York (1995)
Shi, P., Xu, H., Chen, Y.: Using contextual integrity to examine interpersonal information boundary on social network sites. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 35–38. ACM (2013)
Tsai, J.Y., Kelley, P.G., Cranor, L.F., et al.: Location-sharing technologies: privacy risks and controls. ISJLP 6, 119 (2010)
Venkatesh, V., Morris, M.G., Davis, G.B., et al.: User acceptance of information technology: toward a unified view. MIS Q. 27(3), 425–478 (2003)
Xu, H., Gupta, S.: The effects of privacy concerns and personal innovativeness on potential and experienced customers’ adoption of location-based services. Electron. Markets 19(2–3), 137–149 (2009)
Zhou, T.: Examining location-based services usage from the perspectives of unified theory of acceptance and use of technology and privacy risk. J. Electron. Commer. Res. 13(2), 135–144 (2012)
Zhu, C., Wat, K.K., Fang, B., et al.: Privacy and social effects in location sharing services. In: 2012 IEEE First International Conference on Services Economics (SE), pp. 62–65. IEEE (2012)
Zimmer, M.: Privacy on planet Google: using the theory of contextual integrity to clarify the privacy threats of Google’s quest for the perfect search engine. J. Bus. Tech. L. 3, 109 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Gao, S., Zhang, X. (2016). Understanding the Use of Location Sharing Services on Social Networking Platforms in China. In: Obaidat, M., Lorenz, P. (eds) E-Business and Telecommunications. ICETE 2015. Communications in Computer and Information Science, vol 585. Springer, Cham. https://doi.org/10.1007/978-3-319-30222-5_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-30222-5_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-30221-8
Online ISBN: 978-3-319-30222-5
eBook Packages: Computer ScienceComputer Science (R0)