Skip to main content

To Share or Not to Share: Supporting the User Decision in Mobile Social Software Applications

  • Conference paper
Book cover User Modeling 2007 (UM 2007)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4511))

Included in the following conference series:

Abstract

User’s privacy concerns represent one of the most serious obstacles to the wide adoption of mobile social software applications. In this paper, we introduce a conceptual model which tackles the problem from the perspective of trade-off between privacy and trust, where the user takes the decision with minimal privacy loss. To support the user decision, we introduce the Mobile Access Control List (Macl), a privacy management mechanism which takes into account the user attitude towards mobile sharing, his communication history and social network relationships.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agre, P.: Changing Places: Contexts of Awareness in Computing. Human-Computer Interaction 16(2-4), 177–192 (2001)

    Article  Google Scholar 

  2. Anderson, C., Srivastasva, S., Beer, J., Spataro, S., Chatman, J.: Knowing your place: Self perceptions of status in face-to-face groups. Journal of personality and social psychology, pp. 1094–1110 (2006)

    Google Scholar 

  3. Babin, B.J., Darben, W.R., Griffin, M.: Work and/or Fun: Measuring Hedonic and Utilitarian shopping value. Journal of Consumer Research 20(1), 644–656 (1994)

    Article  Google Scholar 

  4. Bellotti, V., Sellen, A.: Design for Privacy in Ubiquitous Computing Environments. In: Proc. ECSCW 1993, pp. 77–92 (1993)

    Google Scholar 

  5. Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: Extrinsic and Intrinsic Motivation to Use Computers in the Workplace. Applied Social Psychology 22(14), 1111–1132 (1992)

    Article  Google Scholar 

  6. Eagle, N., Pentland, A.: Social Serendipity: Mobilizing Social Software. IEEE Pervasive Computing, Special Issue: The Smart Phone, pp. 28–34 (2005)

    Google Scholar 

  7. Farnham, S., Portnoy, W., Turski, A., Cheng, L., Vronay, D.: Personal Map: Automatically Modeling the User’s Online Social Network. In: Interact 2003, pp. 567–574 (2003)

    Google Scholar 

  8. Goffman, E.: The Presentation of Self in Everyday Life. Doubleday, Garden City, New York (1959)

    Google Scholar 

  9. Langheinrich, M.: Personal Privacy in Ubiquitous Computing. Ph.d. Thesis (2005)

    Google Scholar 

  10. Lugano, G.: Understanding Mobile Relationships. In: Workshop on Human-Centered Technology (2006)

    Google Scholar 

  11. Lugano, G., Kyppö, J., Saariluoma, P.: Designing People’s Interconnections in Mobile Social Networks. In: I International Conference on Multidisciplinary Information Sciences and Technologies (2006)

    Google Scholar 

  12. Moreno, J.L.: Who Shall Survive? Fundations of Sociometry, Group Psychotherapy, and Sociodrama. Beacon House (1977)

    Google Scholar 

  13. Persson, P., Younghee, J.: Nokia sensor: from research to product. Designing for User eXperience, San Francisco, California (2005)

    Google Scholar 

  14. Preibusch, S.: Personalized Services with Negotiable Privacy Policies. In: CHI 2006 Workshop on Privacy-Enhanced personalization, Montréal, Canada (2006)

    Google Scholar 

  15. Raento, M.: Kill your personal data dead. In: MobileHCI 2004 Workshop on Location Systems Privacy and Control (2004)

    Google Scholar 

  16. Raento, M., Oulasvirta, A.: Privacy Management for social awareness applications. Context Awareness for Proactive Systems (CAPS), pp. 105–114 (2005)

    Google Scholar 

  17. Seigneur, J.-M., Jensen, C.: Trading Privacy for Trust. In: 2nd International Conference on Trust Management (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Cristina Conati Kathleen McCoy Georgios Paliouras

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lugano, G., Saariluoma, P. (2007). To Share or Not to Share: Supporting the User Decision in Mobile Social Software Applications. In: Conati, C., McCoy, K., Paliouras, G. (eds) User Modeling 2007. UM 2007. Lecture Notes in Computer Science(), vol 4511. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73078-1_61

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73078-1_61

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73077-4

  • Online ISBN: 978-3-540-73078-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics