ABSTRACT
With new technology, people can share information about everyday places they go; the resulting data helps others find and evaluate places. Recent applications like Dodgeball and Sharescape repurpose everyday place information: users create local place data for personal use, and the systems display it for public use. We explore both the opportunities -- new local knowledge, and concerns -- privacy risks, raised by this implicit information sharing. We conduct two empirical studies: subjects create place data when using PlaceMail, a location-based reminder system, and elect whether to share it on Sharescape, a community map-building system. We contribute by: (1) showing location-based reminders yield new local knowledge about a variety of places, (2) identifying heuristics people use when deciding what place-related information to share (and their prevalence), (3) detailing how these decision heuristics can inform local knowledge sharing system design, and (4) identifying new uses of shared place information, notably opportunistic errand planning.
- Ackerman, M., Cranor, L. (1999). Privacy Critics: UI components to safeguard users' privacy. Proc. CHI, 258--259. Google ScholarDigital Library
- Ackerman, M. S. (2000). The Intellectual Challenge of CSCW: The Gap Between Social Requriements and Technical Feasibility. Human-Computer Interaction, 15 (2--3). 181--205. Google ScholarDigital Library
- Alt, C., Astrachan, O., Forbes, J., Lucic, R., Rodger, S. (2006). Social networks generate interest in computer science. Proc. SIGCSE, 438--442. Google ScholarDigital Library
- Ashbrook, D., Starner, T. (2003). Using GPS to Learn Significant Locations and Predict Movements Across Multiple Users. Pers./Ubiq. Computing, V7, n5. Google ScholarDigital Library
- Barkhuus, L., Dey, A. (2003). Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns. Proc., INTERACT, 709--712.Google Scholar
- Buyukkokten, O., Cho, J., Garcia-Molina, H., Gravano, L., Shivakumar, N. (1999). Exploiting geographical location information of web pages. ACM SIGMOD Workshop on the Web and Databases.Google Scholar
- Consolvo, S., Smith, I., Matthews, T., LaMarca, A., Tabert, J., Powledge, P. (2005) Location Disclosure to Social Relations: Why, When, & What People Want to Share. Proc. CHI, 81--90. Google ScholarDigital Library
- Finder, A. (2006). For Some, Online Persona Undermines a Résumé. New York Times. http://www.nytimes.com/2006/06/11/us/11recruit.html?ei=5090&en=ddfbe1e3b386090b&ex=1307678400Google Scholar
- Friedman, B., Howe, D., (2002). Informed Consent in the Mozilla Browser: Implementing Value-Sensitive Design. Proc. Hawaii Intl. Conf. on System Sciences. Google ScholarDigital Library
- Froehlich, J., Chen, M., Smith, I., Potter, F. (2006). Voting With Your Feet: An Investigative Study of the Relationship Between Place Visit Behavior and Preference. Proc. Ubicomp.Google ScholarDigital Library
- Goetz, S., Swaminathan, H. (2006). WalMart and County-Wide Poverty. Social Science Quarterly (87) 2, 211--227.Google Scholar
- Gross, R., Acquisti, A. (2005). Information Revelation and Privacy in Online Social Networks, Workshop, Privacy in Electronic Society. Google ScholarDigital Library
- Hill, W.C., Hollan, J.D., Wroblewski, D., and McCandless, T., (1992). Edit Wear and Read Wear, Proc. CHI, 3--9. Google ScholarDigital Library
- Himmelstein, M., (2005). Local Search: The Internet Is the Yellow Pages, IEEE Computing: 38, 2. 26--34. Google ScholarDigital Library
- Hong, J., Ng, J., Lederer, S., Landay, J. (2004) Privacy risk models for designing privacy-sensitive ubiquitous computing systems. Proc DIS. Google ScholarDigital Library
- Iachello, G., Smith, I., Consolvo, S., Abowd, G., Hughes, J., Howard, J., Potter, F., Scott, J., Sohn, T., Hightower, J., Lamarca, A. (2005) Control, Deception and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service. Proc. Intl. Conf. on Ubiquitous Computing. Google ScholarDigital Library
- Klepis, N., Nelson, W., Ott, W., Robinson, J., Tsang, A., Switzer, P., Behar, J., Hern, S., Engelmann, W. (2001). The National Human Activity Pattern Survey, Journal of Exposure Analysis and Environmental Epidemiology, May-June, v. 11, 3, 231--252.Google Scholar
- Lederer, S., J.I. Hong, A. Dey, and J.A. Landay, (2004). Personal Privacy through Understanding and Action: Five Pitfalls for Designers. Personal and Ubiquitous Computing. 8(6): 440--454. Google ScholarCross Ref
- Ludford, P., Frankowski, D., Reily, K., Wilms, K., Terveen, L. (2006). Because I Carry My Cell Phone Anyway: Effective Everyday Task Management. Proc. CHI. Google ScholarDigital Library
- Olson, J.S., Grudin, J., and Horvitz, E. (2005). A study of preferences for sharing and privacy. CHI Tech Note.Google Scholar
- Palen, L., Dourish, P. (2003). Privacy and trust: Unpacking "privacy" for a networked world. Proc. CHI. 129--136. Google ScholarDigital Library
- Pillsbury, R. (1987). From Hamburger Alley to Hedgerose Heights: Toward a Model of Restaurant Location Dynamics. The Professional Geographer v 39, Issue 3, 326--346.Google Scholar
- Rettig, M. (1994). Prototyping for tiny fingers. Communications of the ACM, v 37, issue 4, 21--27. Google ScholarDigital Library
- Salter, C. (2003). How MapQuest Gets You From Here to There. FastCompany Magazine Issue 76. www.fastcompany.com/magazine/76/mapquest.htmlGoogle Scholar
- Sherif, M., Murphy, G. (1936). The Psychology of Social Norms. Harper and Brother: New York.Google Scholar
- Terry, M., Mynatt, E.D., Ryall, K., and Leigh, D. (2002). Social Net: Using Patterns of Physical Proximity over Time to Infer Shared Interests. Extended Abstracts of CHI 2002. Google ScholarDigital Library
- Terveen, L. and McDonald, D. Social Matching: A Framework and Research Agenda. ACM Transactions on Computer-Human Interaction, 12, 3 401--434. Google ScholarDigital Library
- Tse, A., Sin, L., Yim, F. (2002). How a crowded restaurant affects consumers' attribution behavior. Intl. Journal of Hospitality Mgmt. 21, 449--454.Google ScholarCross Ref
Index Terms
- Capturing, sharing, and using local place information
Recommendations
Because I carry my cell phone anyway: functional location-based reminder applications
CHI '06: Proceedings of the SIGCHI Conference on Human Factors in Computing SystemsAlthough they have potential, to date location-based information systems have not radically improved the way we interact with our surroundings. To study related issues, we developed a location-based reminder system, PlaceMail, and demonstrate its ...
Sharing everyday places I go while preserving privacy
CHI EA '06: CHI '06 Extended Abstracts on Human Factors in Computing SystemsSeveral new location-based information applications reveal sets of places that an individual frequently visits. This practice gives rise to related privacy questions and new interface needs. For example, while electronic system users want to be in ...
Protecting location privacy using location semantics
KDD '11: Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data miningAs the use of mobile devices increases, a location-based service (LBS) becomes increasingly popular because it provides more convenient context-aware services. However, LBS introduces problematic issues for location privacy due to the nature of the ...
Comments