ABSTRACT
We present an initial exploration of bluejacking, the practice of using Bluetooth-enabled mobile phones to send unsolicited messages to other Bluetooth-enabled mobile phones within a transmission range of 10 meters. A content analysis was conducted on 427 bluejacks from Bluejackq, an online community of bluejackers, in which the contextual characteristics of bluejacking were examined. Bluejacking was found to be highly location-dependent, primarily transpiring in everyday public places. The message content of the bluejacks was also inspired by the physical location where bluejacking took place. We also discuss implications of bluejacking with regards to its relationship to public space and comment on how these findings are relevant to mobile social computing.
- Altman, I. The Environment and Social Behavior. Brooks/Cole Publishing Company, Monterey, CA, 1975.Google Scholar
- Bauer, M. W. Classical content analysis: A review. In M. W. Bauer & G. Gaskell (Eds.), Qualitative Researching with Text, Image, and Sound: A Practical Handbook. Sage Publications, London, 2000, 131--151.Google Scholar
- Bluejackq. (http://www.bluejackq.com)Google Scholar
- Edney, J. J. Human territoriality. Psychological Bulletin, 81 (1974), 959--975.Google ScholarCross Ref
- Goffman, E. Relations in Public. Basic Books, New York, NY, 1971.Google Scholar
- Hall, E. The Hidden Dimension. Anchor Books, New York, NY, 1966.Google Scholar
- Lyman, S. M. & Scott, M. B. Territoriality: A neglected sociological dimension. Social Problems, 15 (1967), 235--249.Google ScholarCross Ref
- Milgram, S. The individual in a social world: essays and experiments. New York, NY, McGraw Hill, 1992.Google Scholar
- Paulos, E. & Goodman, E. The Familiar Stranger: Anxiety, Comfort and Play in Public Spaces. In Proc. of CHI'04, 223--230. Google ScholarDigital Library
- Scott, S. & Inkpen, K. Territoriality in Collaborative Tabletop Workspaces. In Proc. of CSCW'04. ACM Press, New York, NY, 294--303. Google ScholarDigital Library
Index Terms
- Location, location, location: a study of bluejacking practices
Recommendations
Location Privacy Vulnerable from Bluetooth Devices
NBIS '13: Proceedings of the 2013 16th International Conference on Network-Based Information SystemsBluetooth is a wireless network protocol widely used for many mobile devices. With carrying some Bluetooth devices, individuals are in the risk to be identified without noticing. Many devices are shipped as Bluetooth activated as default. This paper ...
Communicating Through Location: The Understood Meaning of the Foursquare Check-In
Location-based social networks LBSNs are mobile applications that allow people to share their physical location with friends through their mobile device. The sharing of location is a relatively new form of computer-mediated communication, and there is a ...
Location, location, location: about home networking devices location and features
DUXU'13: Proceedings of the Second international conference on Design, User Experience, and Usability: design philosophy, methods, and tools - Volume Part IA home. It is where people spend most of their family time. It is a place to gather friends. It is somewhere to escape the world in the comfort of someplace that is our own. And it is a location that is filled with a variety of big and small appliances ...
Comments