skip to main content
10.1145/2441776.2441808acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article

What a tangled web we weave: lying backfires in location-sharing social media

Published:23 February 2013Publication History

ABSTRACT

Prior research shows that a root cause of many privacy concerns in location-sharing social media is people's desire to preserve offline relationship boundaries. Other literature recognizes lying as an everyday phenomenon that preserves such relationship boundaries by facilitating smooth social interactions. Combining these strands of research, one might hypothesize that people with a predisposition to lie would generally have lower privacy concerns since lying is a means to preserve relationship boundaries. We tested this hypothesis using structural equation modeling on data from a survey administered nationwide (N=1532), and found that for location-sharing, people with a high propensity to lie actually have increased boundary preservation concerns as well as increased privacy concerns. We explain these findings using results from semi-structured interviews.

References

  1. Acquisti, A. and Gross, R. 2006. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. Privacy Enhancing Technologies. 36--58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Acquisti, A. and Gross, R. 2009. Predicting Social Security Numbers from Public Data. PNAS. 106, 27 (2009), 10975--10980.Google ScholarGoogle ScholarCross RefCross Ref
  3. Altman, I. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole Publishing Company.Google ScholarGoogle Scholar
  4. Aoki, P. and Woodruff, A. 2005. Making Space for Stories. Proc. CHI 2005 (2005), 181--190. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bagüés, S. A., Zeidler, A., Valdivielso, C. F. and Matias, I. R. 2007. Disappearing for a While - Using White Lies in Pervasive Computing. Proc. WPES 2007 (2007), 80--83. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Barkhuus, L., Brown, B., Bell, M., Sherwood, S., Hall, M. and Chalmers, M. 2008. From Awareness to Repartee: Sharing Location within Social Groups. Proc. CHI 2008 (2008), 497--506. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Binder, J., Howes, A. and Sutcliffe, A. 2009. The Problem of Conflicting Social Spheres: Effects of Network Structure on Experienced Tension in Social Network Sites. Proc. CHI 2009 (2009), 965--974. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Birchmeier, Z., Dietz-Uhler, B. and Stasser, G. 2011. Strategic Uses of Social Technology: An Interactive Perspective of Social Psychology. Cambridge University Press.Google ScholarGoogle Scholar
  9. Birnholtz, J. 2010. Adopt, Adapt, Abandon: Understanding Why Some Young Adults Start, and then Stop, Using Instant Messaging. Computers in Human Behavior. 26, 6 (2010), 1427--1433. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Birnholtz, J., Guillory, J., Hancock, J. and Bazarova, N. 2010. "on my way": Deceptive Texting and Interpersonal Awareness Narratives. Proc. CSCW 2010 (2010), 1--4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Boesen, J., Rode, J. A. and Mancini, C. 2010. The Domestic Panopticon: Location Tracking in Families. Proc. UbiComp 2010 (2010), 65--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Boyd, D. M. and Ellison, N. B. 2007. Social Network Sites: Definition, History, and Scholarship. Journal of Computer-Mediated Communication. 13, 1 (2007), 210--230.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Brown, B., Taylor, A., Izadi, S., Sellen, A., Kaye, J. and Eardley, R. 2007. Locating Family Values: A Field Trial of the Whereabouts Clock. Proc. UbiComp 2007 (2007), 354--371. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Buller, D. B. and Burgoon, J. K. 1996. Interpersonal Deception Theory. Communication Theory. 6, 3 (1996), 203--242.Google ScholarGoogle ScholarCross RefCross Ref
  15. Burish, T. G. and Houston, B. K. 1976. Construct Validity of the Lie scale as a Measure of Defensiveness. Journal of Clinical Psychology. 32, 2 (1976), 310--314.Google ScholarGoogle Scholar
  16. Carlson, J. R., George, J. F., Burgoon, J. K., Adkins, M. and White, C. H. 2004. Deception in Computer-Mediated Communication. Group Decision and Negotiation. 13, (2004), 5--28.Google ScholarGoogle Scholar
  17. Caspi, A. and Gorsky, P. 2006. Online Deception: Prevalence, Motivation, and Emotion. CyberPsychology & Behavior. 9, (2006), 54--59.Google ScholarGoogle Scholar
  18. Consolvo, S., Smith, I., Matthews, T., LaMarca, A., Tabert, J. and Powledge, P. 2005. Location Disclosure to Social Relations: Why, When, & What People Want to Share. Proc. CHI 2005 (2005), 81--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. DePaulo, B. M. and Kashy, D. A. 1998. Everyday lies in close and casual relationships. Journal of Personality and Social Psychology. 74, 1 (1998), 63--79.Google ScholarGoogle ScholarCross RefCross Ref
  20. DePaulo, B. M., Kashy, D. A., Kirkendol, S. E., Wyer, M. M. and Epstein, J. A. 1996. Lying in Everyday Life. Journal of Personality and Social Psychology. 70, 5 (1996), 979--995.Google ScholarGoogle ScholarCross RefCross Ref
  21. Ehrlich, K. and Shami, N. S. 2010. Microblogging Inside and Outside the Workplace. Proc. ICWSM 2010 (2010).Google ScholarGoogle Scholar
  22. Ekman, P. and Friesen, W. V. 1969. Nonverbal Leakage and Clues to Deception. Psychiatry: Journal for the Study of Interpersonal Processes. 32, 1 (1969), 88--106.Google ScholarGoogle ScholarCross RefCross Ref
  23. Eysenck, H. J. and Eysenck, S. B. G. 1991. Manual of the Eysenck Personality Scales (EPS adult). Hodder & Stoughton.Google ScholarGoogle Scholar
  24. Francis, L. J. 1991. The Dual Nature of the EPQ Lie Scale Among College Students in England. Personality and Individual Differences. 12, 12 (1991), 1255--1260.Google ScholarGoogle ScholarCross RefCross Ref
  25. Glaser, B. G. and Strauss, A. L. 1967. The Discovery of Grounded Theory. Aldine.Google ScholarGoogle Scholar
  26. Goffman, E. 1959. The Presentation of Self in Everday Life. Anchor Books.Google ScholarGoogle Scholar
  27. Hancock, J., Birnholtz, J., Bazarova, N., Guillory, J., Perlin, J. and Amos, B. 2009. Butler Lies: Awareness, Deception and Design. Proc. CHI 2009 (2009), 517--526. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Hancock, J. T., Thom-Santelli, J. and Ritchie, T. 2004. Deception and design: the impact of communication technology on lying behavior. Proc. CHI 2004 (2004), 129--134. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Hasler, L. and Ruthven, I. 2011. Escaping Information Poverty through Internet Newsgroups. Proc. ICWSM 2011 (2011).Google ScholarGoogle Scholar
  30. Hine, C. 2005. Virtual Methods: Issues in Social Research on the Internet. Berg Publishers.Google ScholarGoogle Scholar
  31. Hong, J. and Landay, J. 2004. An architecture for privacy-sensitive ubiquitous computing. Proc. MobiSys 2004 (2004), 177--189. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Humphreys, L. 2007. Mobile Social Networks and Social Practice: A Case Study of Dodgeball. Journal of Computer-Mediated Communication. 13, 1 (2007), 341--360.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Iachello, G., Smith, I., Consolvo, S., Abowd, G. D., Hughes, J., Howard, J., Potter, F., Scott, J., Sohn, T., Hightower, J. and LaMarca, A. 2005. Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service. Proc. UbiComp 2005 (2005), 213--231. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Kashy, D. A. and DePaulo, B. M. 1996. Who Lies? Journal of Personality and Social Psychology. 70, 5 (1996), 1037--1051.Google ScholarGoogle ScholarCross RefCross Ref
  35. Kline, R. B. 2004. Principles and Practice of Structural Equation Modeling, Second Edition. The Guilford Press.Google ScholarGoogle Scholar
  36. Knobel, C. and Bowker, G. C. 2011. Values in design. Communications of the ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Latour, B. 1992. Where Are the Missing Masses? The Sociology of a Few Mundane Artifacts. Shaping Technology/Building Society: Studies in Sociotechnical Change. MIT Press. 225--258.Google ScholarGoogle Scholar
  38. Leary, M. R. and Kowalski, R. M. 1990. Impression Management: A Literature Review and Two-Component Model. Psychological Bulletin. 107, 1 (1990), 34--47.Google ScholarGoogle ScholarCross RefCross Ref
  39. Leary, M. R., Tchividijian, L. R. and Kraxberger, B. E. 1994. Self-Presentation Can Be Hazardous to Your Health: Impression Management and Health Risk. Health Psychology. 13, 6 (1994), 461--470.Google ScholarGoogle Scholar
  40. Lederer, S., Hong, J. I., Dey, A. K. and Landay, J. A. 2004. Personal Privacy through Understanding and Action: Five Pitfalls for Designers. Personal and Ubiquitous Computing. 8, 6 (2004), 440--454. Google ScholarGoogle ScholarCross RefCross Ref
  41. Lederer, S., Mankoff, J. and Dey, A. K. 2003. Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing. Ext. Abstracts CHI 2003 (2003), 724--725. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Lenhart, A. and Madden, M. 2007. Teens, Privacy and Online Social Networks. Pew Internet & American Life Project.Google ScholarGoogle Scholar
  43. Li, N. and Chen, G. 2010. Sharing location in online social networks. IEEE Network. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. McCrae, R. R. and Costa Jr., P. T. 1985. Comparison of EPI and Psychoticism Scales with Measures of the Five-Factor Model of Personality. Personality and Individual Differences. 6, 5 (1985), 587--597.Google ScholarGoogle ScholarCross RefCross Ref
  45. Nardi, B. A., Schiano, D. J. and Gumbrecht, M. 2004. Blogging as Social Activity, or, Would You Let 900 Million People Read your Diary? Proc. CSCW 2004 (2004), 222--231. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Neuburger, J. 2008. Teacher Fired for Inappropriate Behavior on MySpace Page. PBS.org.Google ScholarGoogle Scholar
  47. O'Sullivan, B. 2000. What You Don't Know Won't Hurt Me: Impression Management Functions of Communication Channels in Relationships. Human Communication Research. 26, 3 (2000), 403--431.Google ScholarGoogle Scholar
  48. Olson, J. S., Grudin, J. and Horvitz, E. 2005. A study of preferences for sharing and privacy. Ext. Abstracts CHI 2005 (2005), 1985--1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Orlikowski, W. and Robey, D. 1991. Information Technology and the Structuring of Organizations. Information Systems Research. 2, 2 (1991), 143--169.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Page, X. and Kobsa, A. 2010. Navigating the Social Terrain with Google Latitude. iConference 2010 (2010).Google ScholarGoogle Scholar
  51. Page, X. and Kobsa, A. 2009. The Circles of Latitude: Adoption and Usage of Location Tracking in Online Social Networking. CSE 2009 (2009), 1027--1030. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Page, X., Kobsa, A. and Knijnenburg, B. P. 2012. Don't Disturb My Circles! Boundary Preservation Is at the Center of Location-Sharing Concerns. Proc. ICWSM 2012 (2012).Google ScholarGoogle Scholar
  53. Palen, L. and Dourish, P. 2003. Unpacking "Privacy" for a Networked World. Proc. CHI 2003 (2003), 129--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Patil, S., Page, X. and Kobsa, A. 2011. With a little help from my friends: can social navigation inform interpersonal privacy preferences? CSCW 2011 (2011), 391--394. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Paulhus, D. L. 1984. Two-component Models of Socially Desirable Responding. Journal of Personality and Social Psychology. 46, 3 (1984), 598--609.Google ScholarGoogle ScholarCross RefCross Ref
  56. Pearson, P. R. and Francis, L. J. 1989. The Dual Nature of the Eysenckian Lie Scales: Are Religious Adolescents More Truthful? Personality and Individual Differences. 10, 10 (1989), 1041--1048.Google ScholarGoogle ScholarCross RefCross Ref
  57. Raento, M. and Oulasvirta, A. 2008. Designing for Privacy and Self-presentation in Social Awareness. Personal and Ubiquitous Computing. 12, 7 (2008), 527--542. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Ratcliffe, M. A., Dawson, A. A. and Walker, L. G. 1995. Eysenck Personality Inventory L-scores in Patients with Hodgkin's Disease and Non-Hodgkin's Lymphoma. Psycho-Oncology. 4, 1 (1995), 39--45.Google ScholarGoogle ScholarCross RefCross Ref
  59. Sackeim, H. A. and Gur, R. C. 1979. Self-deception, Other-deception, and Self-reported Psychopathology. Journal of Consulting and Clinical Psychology. 47, 1 (1979), 213--215.Google ScholarGoogle ScholarCross RefCross Ref
  60. Satchell, C. and Dourish, P. 2009. Beyond the User: Use and Non-use in HCI. Proc. OZCHI 2009 (2009), 9--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Singleton, R. and Straits, B. C. 2005. Approaches to Social Research. Oxford University Press.Google ScholarGoogle Scholar
  62. Smith, A. 2012. Nearly half of American adults are smartphone owners. Pew Internet & American Life Project.Google ScholarGoogle Scholar
  63. Smith, H. J. and Rogers, Y. 2003. Managing One's Social Network: Does Age Make a Difference? Proc. Interact 2003 (2003).Google ScholarGoogle Scholar
  64. Solove, D. J. 2008. Understanding Privacy. Harvard University Press.Google ScholarGoogle Scholar
  65. Stutzman, F. and Kramer-Duffield, J. 2010. Friends Only: Examining a Privacy-enhancing Behavior in Facebook. Proc. CHI 2010 (2010), 1553--1562. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Tang, K. P., Lin, J., Hong, J. I., Siewiorek, D. P. and Sadeh, N. 2010. Rethinking Location Sharing: Exploring the Implications of Social-driven vs. Purpose-driven Location Sharing. Proc. UbiComp 2010 (2010), 85--94. Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Tsai, J. Y., Kelley, P., Cranor, L. F. and Sadeh, N. 2010. Location-Sharing Technologies: Privacy Risks and Controls. I/S: A Journal of Law and Policy for the Information Society. 6, 1 (2010), 119--151.Google ScholarGoogle Scholar
  68. Tufekci, Z. 2008. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites. Bulletin of Science, Technology & Society. 28, 1 (2008), 20--36.Google ScholarGoogle ScholarCross RefCross Ref
  69. Vanden Abeele, M. and Roe, K. 2008. White Cyberlies: the Use of Deceptive Instant Messaging Statuses as a Social Norm. Proc. ICA 2008 (2008).Google ScholarGoogle Scholar
  70. Want, R., Hopper, A., Falcão, V. and Gibbons, J. 1992. The Active Badge Location System. ACM Transactions on Information Systerms. 10, 1 (1992), 91--102. Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Warren, S. and Brandeis, L. D. 1890. The Right to Privacy. Harvard Law Review. 4, 5 (1890), 193--220.Google ScholarGoogle ScholarCross RefCross Ref
  72. Westin, A. 1967. Privacy and Freedom. Atheneum.Google ScholarGoogle Scholar
  73. Wiese, J., Kelley, P. G., Cranor, L. F., Dabbish, L., Hong, J. I. and Zimmerman, J. 2011. Are You Close with Me? Are You Nearby?: Investigating Social Groups, Closeness, and Willingness to Share. Proc. UbiComp 2011 (2011), 197--206. Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Zickuhr, K. 2012. Three-quarters of smartphone owners use location-based services. Pew Internet & American Life ProjectGoogle ScholarGoogle Scholar

Index Terms

  1. What a tangled web we weave: lying backfires in location-sharing social media

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CSCW '13: Proceedings of the 2013 conference on Computer supported cooperative work
          February 2013
          1594 pages
          ISBN:9781450313315
          DOI:10.1145/2441776

          Copyright © 2013 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 23 February 2013

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate2,235of8,521submissions,26%

          Upcoming Conference

          CSCW '24

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader