ABSTRACT
Prior research shows that a root cause of many privacy concerns in location-sharing social media is people's desire to preserve offline relationship boundaries. Other literature recognizes lying as an everyday phenomenon that preserves such relationship boundaries by facilitating smooth social interactions. Combining these strands of research, one might hypothesize that people with a predisposition to lie would generally have lower privacy concerns since lying is a means to preserve relationship boundaries. We tested this hypothesis using structural equation modeling on data from a survey administered nationwide (N=1532), and found that for location-sharing, people with a high propensity to lie actually have increased boundary preservation concerns as well as increased privacy concerns. We explain these findings using results from semi-structured interviews.
- Acquisti, A. and Gross, R. 2006. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. Privacy Enhancing Technologies. 36--58. Google ScholarDigital Library
- Acquisti, A. and Gross, R. 2009. Predicting Social Security Numbers from Public Data. PNAS. 106, 27 (2009), 10975--10980.Google ScholarCross Ref
- Altman, I. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole Publishing Company.Google Scholar
- Aoki, P. and Woodruff, A. 2005. Making Space for Stories. Proc. CHI 2005 (2005), 181--190. Google ScholarDigital Library
- Bagüés, S. A., Zeidler, A., Valdivielso, C. F. and Matias, I. R. 2007. Disappearing for a While - Using White Lies in Pervasive Computing. Proc. WPES 2007 (2007), 80--83. Google ScholarDigital Library
- Barkhuus, L., Brown, B., Bell, M., Sherwood, S., Hall, M. and Chalmers, M. 2008. From Awareness to Repartee: Sharing Location within Social Groups. Proc. CHI 2008 (2008), 497--506. Google ScholarDigital Library
- Binder, J., Howes, A. and Sutcliffe, A. 2009. The Problem of Conflicting Social Spheres: Effects of Network Structure on Experienced Tension in Social Network Sites. Proc. CHI 2009 (2009), 965--974. Google ScholarDigital Library
- Birchmeier, Z., Dietz-Uhler, B. and Stasser, G. 2011. Strategic Uses of Social Technology: An Interactive Perspective of Social Psychology. Cambridge University Press.Google Scholar
- Birnholtz, J. 2010. Adopt, Adapt, Abandon: Understanding Why Some Young Adults Start, and then Stop, Using Instant Messaging. Computers in Human Behavior. 26, 6 (2010), 1427--1433. Google ScholarDigital Library
- Birnholtz, J., Guillory, J., Hancock, J. and Bazarova, N. 2010. "on my way": Deceptive Texting and Interpersonal Awareness Narratives. Proc. CSCW 2010 (2010), 1--4. Google ScholarDigital Library
- Boesen, J., Rode, J. A. and Mancini, C. 2010. The Domestic Panopticon: Location Tracking in Families. Proc. UbiComp 2010 (2010), 65--74. Google ScholarDigital Library
- Boyd, D. M. and Ellison, N. B. 2007. Social Network Sites: Definition, History, and Scholarship. Journal of Computer-Mediated Communication. 13, 1 (2007), 210--230.Google ScholarDigital Library
- Brown, B., Taylor, A., Izadi, S., Sellen, A., Kaye, J. and Eardley, R. 2007. Locating Family Values: A Field Trial of the Whereabouts Clock. Proc. UbiComp 2007 (2007), 354--371. Google ScholarDigital Library
- Buller, D. B. and Burgoon, J. K. 1996. Interpersonal Deception Theory. Communication Theory. 6, 3 (1996), 203--242.Google ScholarCross Ref
- Burish, T. G. and Houston, B. K. 1976. Construct Validity of the Lie scale as a Measure of Defensiveness. Journal of Clinical Psychology. 32, 2 (1976), 310--314.Google Scholar
- Carlson, J. R., George, J. F., Burgoon, J. K., Adkins, M. and White, C. H. 2004. Deception in Computer-Mediated Communication. Group Decision and Negotiation. 13, (2004), 5--28.Google Scholar
- Caspi, A. and Gorsky, P. 2006. Online Deception: Prevalence, Motivation, and Emotion. CyberPsychology & Behavior. 9, (2006), 54--59.Google Scholar
- Consolvo, S., Smith, I., Matthews, T., LaMarca, A., Tabert, J. and Powledge, P. 2005. Location Disclosure to Social Relations: Why, When, & What People Want to Share. Proc. CHI 2005 (2005), 81--90. Google ScholarDigital Library
- DePaulo, B. M. and Kashy, D. A. 1998. Everyday lies in close and casual relationships. Journal of Personality and Social Psychology. 74, 1 (1998), 63--79.Google ScholarCross Ref
- DePaulo, B. M., Kashy, D. A., Kirkendol, S. E., Wyer, M. M. and Epstein, J. A. 1996. Lying in Everyday Life. Journal of Personality and Social Psychology. 70, 5 (1996), 979--995.Google ScholarCross Ref
- Ehrlich, K. and Shami, N. S. 2010. Microblogging Inside and Outside the Workplace. Proc. ICWSM 2010 (2010).Google Scholar
- Ekman, P. and Friesen, W. V. 1969. Nonverbal Leakage and Clues to Deception. Psychiatry: Journal for the Study of Interpersonal Processes. 32, 1 (1969), 88--106.Google ScholarCross Ref
- Eysenck, H. J. and Eysenck, S. B. G. 1991. Manual of the Eysenck Personality Scales (EPS adult). Hodder & Stoughton.Google Scholar
- Francis, L. J. 1991. The Dual Nature of the EPQ Lie Scale Among College Students in England. Personality and Individual Differences. 12, 12 (1991), 1255--1260.Google ScholarCross Ref
- Glaser, B. G. and Strauss, A. L. 1967. The Discovery of Grounded Theory. Aldine.Google Scholar
- Goffman, E. 1959. The Presentation of Self in Everday Life. Anchor Books.Google Scholar
- Hancock, J., Birnholtz, J., Bazarova, N., Guillory, J., Perlin, J. and Amos, B. 2009. Butler Lies: Awareness, Deception and Design. Proc. CHI 2009 (2009), 517--526. Google ScholarDigital Library
- Hancock, J. T., Thom-Santelli, J. and Ritchie, T. 2004. Deception and design: the impact of communication technology on lying behavior. Proc. CHI 2004 (2004), 129--134. Google ScholarDigital Library
- Hasler, L. and Ruthven, I. 2011. Escaping Information Poverty through Internet Newsgroups. Proc. ICWSM 2011 (2011).Google Scholar
- Hine, C. 2005. Virtual Methods: Issues in Social Research on the Internet. Berg Publishers.Google Scholar
- Hong, J. and Landay, J. 2004. An architecture for privacy-sensitive ubiquitous computing. Proc. MobiSys 2004 (2004), 177--189. Google ScholarDigital Library
- Humphreys, L. 2007. Mobile Social Networks and Social Practice: A Case Study of Dodgeball. Journal of Computer-Mediated Communication. 13, 1 (2007), 341--360.Google ScholarDigital Library
- Iachello, G., Smith, I., Consolvo, S., Abowd, G. D., Hughes, J., Howard, J., Potter, F., Scott, J., Sohn, T., Hightower, J. and LaMarca, A. 2005. Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service. Proc. UbiComp 2005 (2005), 213--231. Google ScholarDigital Library
- Kashy, D. A. and DePaulo, B. M. 1996. Who Lies? Journal of Personality and Social Psychology. 70, 5 (1996), 1037--1051.Google ScholarCross Ref
- Kline, R. B. 2004. Principles and Practice of Structural Equation Modeling, Second Edition. The Guilford Press.Google Scholar
- Knobel, C. and Bowker, G. C. 2011. Values in design. Communications of the ACM. Google ScholarDigital Library
- Latour, B. 1992. Where Are the Missing Masses? The Sociology of a Few Mundane Artifacts. Shaping Technology/Building Society: Studies in Sociotechnical Change. MIT Press. 225--258.Google Scholar
- Leary, M. R. and Kowalski, R. M. 1990. Impression Management: A Literature Review and Two-Component Model. Psychological Bulletin. 107, 1 (1990), 34--47.Google ScholarCross Ref
- Leary, M. R., Tchividijian, L. R. and Kraxberger, B. E. 1994. Self-Presentation Can Be Hazardous to Your Health: Impression Management and Health Risk. Health Psychology. 13, 6 (1994), 461--470.Google Scholar
- Lederer, S., Hong, J. I., Dey, A. K. and Landay, J. A. 2004. Personal Privacy through Understanding and Action: Five Pitfalls for Designers. Personal and Ubiquitous Computing. 8, 6 (2004), 440--454. Google ScholarCross Ref
- Lederer, S., Mankoff, J. and Dey, A. K. 2003. Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing. Ext. Abstracts CHI 2003 (2003), 724--725. Google ScholarDigital Library
- Lenhart, A. and Madden, M. 2007. Teens, Privacy and Online Social Networks. Pew Internet & American Life Project.Google Scholar
- Li, N. and Chen, G. 2010. Sharing location in online social networks. IEEE Network. Google ScholarDigital Library
- McCrae, R. R. and Costa Jr., P. T. 1985. Comparison of EPI and Psychoticism Scales with Measures of the Five-Factor Model of Personality. Personality and Individual Differences. 6, 5 (1985), 587--597.Google ScholarCross Ref
- Nardi, B. A., Schiano, D. J. and Gumbrecht, M. 2004. Blogging as Social Activity, or, Would You Let 900 Million People Read your Diary? Proc. CSCW 2004 (2004), 222--231. Google ScholarDigital Library
- Neuburger, J. 2008. Teacher Fired for Inappropriate Behavior on MySpace Page. PBS.org.Google Scholar
- O'Sullivan, B. 2000. What You Don't Know Won't Hurt Me: Impression Management Functions of Communication Channels in Relationships. Human Communication Research. 26, 3 (2000), 403--431.Google Scholar
- Olson, J. S., Grudin, J. and Horvitz, E. 2005. A study of preferences for sharing and privacy. Ext. Abstracts CHI 2005 (2005), 1985--1988. Google ScholarDigital Library
- Orlikowski, W. and Robey, D. 1991. Information Technology and the Structuring of Organizations. Information Systems Research. 2, 2 (1991), 143--169.Google ScholarDigital Library
- Page, X. and Kobsa, A. 2010. Navigating the Social Terrain with Google Latitude. iConference 2010 (2010).Google Scholar
- Page, X. and Kobsa, A. 2009. The Circles of Latitude: Adoption and Usage of Location Tracking in Online Social Networking. CSE 2009 (2009), 1027--1030. Google ScholarDigital Library
- Page, X., Kobsa, A. and Knijnenburg, B. P. 2012. Don't Disturb My Circles! Boundary Preservation Is at the Center of Location-Sharing Concerns. Proc. ICWSM 2012 (2012).Google Scholar
- Palen, L. and Dourish, P. 2003. Unpacking "Privacy" for a Networked World. Proc. CHI 2003 (2003), 129--136. Google ScholarDigital Library
- Patil, S., Page, X. and Kobsa, A. 2011. With a little help from my friends: can social navigation inform interpersonal privacy preferences? CSCW 2011 (2011), 391--394. Google ScholarDigital Library
- Paulhus, D. L. 1984. Two-component Models of Socially Desirable Responding. Journal of Personality and Social Psychology. 46, 3 (1984), 598--609.Google ScholarCross Ref
- Pearson, P. R. and Francis, L. J. 1989. The Dual Nature of the Eysenckian Lie Scales: Are Religious Adolescents More Truthful? Personality and Individual Differences. 10, 10 (1989), 1041--1048.Google ScholarCross Ref
- Raento, M. and Oulasvirta, A. 2008. Designing for Privacy and Self-presentation in Social Awareness. Personal and Ubiquitous Computing. 12, 7 (2008), 527--542. Google ScholarDigital Library
- Ratcliffe, M. A., Dawson, A. A. and Walker, L. G. 1995. Eysenck Personality Inventory L-scores in Patients with Hodgkin's Disease and Non-Hodgkin's Lymphoma. Psycho-Oncology. 4, 1 (1995), 39--45.Google ScholarCross Ref
- Sackeim, H. A. and Gur, R. C. 1979. Self-deception, Other-deception, and Self-reported Psychopathology. Journal of Consulting and Clinical Psychology. 47, 1 (1979), 213--215.Google ScholarCross Ref
- Satchell, C. and Dourish, P. 2009. Beyond the User: Use and Non-use in HCI. Proc. OZCHI 2009 (2009), 9--16. Google ScholarDigital Library
- Singleton, R. and Straits, B. C. 2005. Approaches to Social Research. Oxford University Press.Google Scholar
- Smith, A. 2012. Nearly half of American adults are smartphone owners. Pew Internet & American Life Project.Google Scholar
- Smith, H. J. and Rogers, Y. 2003. Managing One's Social Network: Does Age Make a Difference? Proc. Interact 2003 (2003).Google Scholar
- Solove, D. J. 2008. Understanding Privacy. Harvard University Press.Google Scholar
- Stutzman, F. and Kramer-Duffield, J. 2010. Friends Only: Examining a Privacy-enhancing Behavior in Facebook. Proc. CHI 2010 (2010), 1553--1562. Google ScholarDigital Library
- Tang, K. P., Lin, J., Hong, J. I., Siewiorek, D. P. and Sadeh, N. 2010. Rethinking Location Sharing: Exploring the Implications of Social-driven vs. Purpose-driven Location Sharing. Proc. UbiComp 2010 (2010), 85--94. Google ScholarDigital Library
- Tsai, J. Y., Kelley, P., Cranor, L. F. and Sadeh, N. 2010. Location-Sharing Technologies: Privacy Risks and Controls. I/S: A Journal of Law and Policy for the Information Society. 6, 1 (2010), 119--151.Google Scholar
- Tufekci, Z. 2008. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites. Bulletin of Science, Technology & Society. 28, 1 (2008), 20--36.Google ScholarCross Ref
- Vanden Abeele, M. and Roe, K. 2008. White Cyberlies: the Use of Deceptive Instant Messaging Statuses as a Social Norm. Proc. ICA 2008 (2008).Google Scholar
- Want, R., Hopper, A., Falcão, V. and Gibbons, J. 1992. The Active Badge Location System. ACM Transactions on Information Systerms. 10, 1 (1992), 91--102. Google ScholarDigital Library
- Warren, S. and Brandeis, L. D. 1890. The Right to Privacy. Harvard Law Review. 4, 5 (1890), 193--220.Google ScholarCross Ref
- Westin, A. 1967. Privacy and Freedom. Atheneum.Google Scholar
- Wiese, J., Kelley, P. G., Cranor, L. F., Dabbish, L., Hong, J. I. and Zimmerman, J. 2011. Are You Close with Me? Are You Nearby?: Investigating Social Groups, Closeness, and Willingness to Share. Proc. UbiComp 2011 (2011), 197--206. Google ScholarDigital Library
- Zickuhr, K. 2012. Three-quarters of smartphone owners use location-based services. Pew Internet & American Life ProjectGoogle Scholar
Index Terms
- What a tangled web we weave: lying backfires in location-sharing social media
Recommendations
Public Friends and Private Sharing: Understanding Shifting Privacies in Sharing Culture
#SMSociety17: Proceedings of the 8th International Conference on Social Media & SocietyThis paper seeks to address the tension between privacy and sharing culture. Despite many claims that privacy is dead, research suggests that there is a shift from privacy as an individualized right based around control to something more social, more ...
The Confidence in Social Media Platforms and Private Messaging
Social Computing and Social Media. Design, Ethics, User Behavior, and Social Network AnalysisAbstractIn this paper, we focus on social media users and examine the factors predicting users’ confidence in platforms in case of private messaging. For the social media platforms, social ties and information that flows through the contacts are valuable ...
Factors mediating disclosure in social network sites
In this paper, we explore how privacy settings and privacy policy consumption (reading the privacy policy) affect the relationship between privacy attitudes and disclosure behaviors. We present results from a survey completed by 122 users of Facebook ...
Comments