ABSTRACT
Social network sites, location-sharing services and, more recently, applications enabling the quantified self, mean that people are generating and sharing more data than ever before. It is important to understand the potential privacy impacts when such personal data are commercialised, to ensure that expectations of privacy are preserved. This paper presents the first user study of incentivised location sharing, where people are given a direct monetary incentive to share their location with a business or their social network. We use Nissenbaum's framework of contextual integrity in a preliminary user study (n=22) to investigate potential privacy risks with such services. We find that monetisation changes why people share their data, but not the frequency of disclosures. Our results motivate further study and are useful for designers of location-sharing systems and researchers who wish to leverage the diverse range of personal data that are available in a privacy-sensitive manner.
- D. Anthony, T. Henderson, and D. Kotz. Privacy in location-aware computing environments. IEEE Pervasive Computing, 6(4):64--72, Oct. 2007. doi:10.1109/mprv.2007.83. Google ScholarDigital Library
- C. Aperjis and B. A. Huberman. A market for unbiased private data: Paying individuals according to their privacy attitudes. First Monday, 17(5--7), May 2012. doi:10.5210/fm.v17i5.4013.Google Scholar
- L. Barkhuus. The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI. In Proc. CHI, pages 367--376, May 2012. doi:10.1145/2207676.2207727. Google ScholarDigital Library
- H. Cramer, M. Rost, and L. E. Holmquist. Performing a check-in: emerging practices, norms and "conflicts" in location-sharing using foursquare. In Proc. MobileHCI, pages 57--66, Aug. 2011. doi:10.1145/2037373.2037384. Google ScholarDigital Library
- F. S. Grodzinsky and H. T. Tavani. Privacy in "the cloud": applying Nissenbaum's theory of contextual integrity. ACM SIGCAS Computers and Society, 41(1):38--47, Oct. 2011. doi:10.1145/2095266.2095270. Google ScholarDigital Library
- J. Grossklags and A. Acquisti. When 25 Cents is too much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information. In Proc. WEIS, 2007. Online at http://weis2007.econinfosec.org/papers/66.pdf.Google Scholar
- J. M. Hektner, J. A. Schmidt, and M. Csikszentmihalyi. Experience sampling method: measuring the quality of everyday life. SAGE Publications, Thousand Oaks, CA, USA, 2007.Google Scholar
- L. Hutton and T. Henderson. An architecture for ethical and privacy-sensitive social network experiments. SIGMETRICS Perform. Eval. Rev., 40(4):90--95, Apr. 2013. doi:10.1145/2479942.2479954. Google ScholarDigital Library
- E. A. Jones and J. W. Janes. Anonymity in a world of digital books: Google Books, privacy, and the freedom to read. Policy & Internet, 2(4):42--74, Jan. 2010. doi:10.2202/1944--2866.1072.Google ScholarCross Ref
- P. G. Kelley, M. Benisch, L. F. Cranor, and N. Sadeh. When are users comfortable sharing locations with advertisers? In Proc. CHI, pages 2449--2452, May 2011. doi:10.1145/1978942.1979299. Google ScholarDigital Library
- J. Lindqvist, J. Cranshaw, J. Wiese, J. Hong, and J. Zimmerman. I'm the mayor of my house: examining why people use foursquare - a social-driven location sharing application. In Proc. CHI, pages 2409--2418, May 2011. doi:10.1145/1978942.1979295. Google ScholarDigital Library
- H. R. Lipford, G. Hull, C. Latulipe, A. Besmer, and J. Watson. Visible flows: Contextual integrity and the design of privacy mechanisms on social network sites. In Proc. CSE, volume 4, pages 985--989, Aug. 2009. doi:10.1109/cse.2009.241. Google ScholarDigital Library
- N. K. Malhotra, S. S. Kim, and J. Agarwal. Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4):336--355, Dec. 2004. doi:10.1287/isre.1040.0032 Google ScholarDigital Library
- A. M. McDonald and L. F. Cranor. The cost of reading privacy policies. I/S: A Journal of Law and Pol- icy for the Information Society, 4(3):540--565, 2008. Online at http://www.is-journal.org/files/2012/02/Cranor_Formatted_Final.pdf.Google Scholar
- C. C. Miller. Take a step closer for an invitation to shop. New York Times, page B4, Feb. 23 2010. Online at http://www.nytimes.com/2010/02/23/business/media/23adco.html.Google Scholar
- H. Nissenbaum. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford Law Books, Stanford, CA, USA, 2009. Google ScholarDigital Library
- X. Page, B. P. Knijnenburg, and A. Kobsa. What a tangled web we weave: lying backfires in location-sharing social media. In Proc. CSCW, pages 273--284, 2013. doi:10.1145/2441776.2441808. Google ScholarDigital Library
- S. Patil, G. Norcie, A. Kapadia, and A. J. Lee. Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice. In Proc. Eighth Symposium on Usable Privacy and Security, July 2012. doi:10.1145/2335356.2335363. Google ScholarDigital Library
- M. Rost, L. Barkhuus, H. Cramer, and B. Brown. Representation and Communication: Challenges in Interpreting Large Social Media Datasets. In Proc. CSCW, pages 357--362, 2013. doi:10.1145/2441776.2441817. Google ScholarDigital Library
- R. Schlegel, A. Kapadia, and A. J. Lee. Eyeing your exposure: quantifying and controlling information sharing for improved privacy. In Proc. SOUPS, 2011. doi:10.1145/2078827.2078846. Google ScholarDigital Library
- P. Shi, H. Xu, and Y. Chen. Using contextual integrity to examine interpersonal information boundary on social network sites. In Proc. CHI, pages 35--38, 2013. doi:10.1145/2470654.2470660. Google ScholarDigital Library
- E. D. Spiegler, C. Hildebrand, and F. Michahelles. Social networks in pervasive advertising and shopping. In J. Müller, F. Alt, and D. Michelis, editors, Pervasive Advertising, chapter 10, pages 207--225. Springer, London, UK, 2011. doi:10.1007/978-0--85729--352--7_10.Google Scholar
- K. P. Tang, J. Lin, J. I. Hong, D. P. Siewiorek, and N. Sadeh. Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing. In Proc. Ubicomp, pages 85--94, Sept. 2010. doi:10.1145/1864349.1864363. Google ScholarDigital Library
- E. Toch, J. Cranshaw, P. H. Drielsma, J. Y. Tsai, P. G. Kelley, J. Springfield, L. Cranor, J. Hong, and N. Sadeh. Empirical models of privacy in location sharing. In Proc. 12th ACMinternational conference on Ubiquitous computing, pages 129--138, Sept. 2010. doi:10.1145/1864349.1864364. Google ScholarDigital Library
- J. Y. Tsai, P. Kelley, P. Drielsma, L. F. Cranor, J. Hong, and N. Sadeh. Who's viewed you?: The impact of feedback in a mobile location-sharing application. In Proc. CHI, pages 2003--2012, Apr. 2009. doi:10.1145/1518701.1519005. Google ScholarDigital Library
- R. Unni and R. Harmon. Perceived effectiveness of push vs. pull mobile location based advertising. Journal of Interactive Advertising, 7(2):28--40, 2007. doi:10.1080/15252019.2007.10722129.Google ScholarCross Ref
- B. Ur, P. G. Leon, L. F. Cranor, R. Shay, and Y. Wang. Smart, useful, scary, creepy: perceptions of online behavioral advertising. In Proc. SOUPS, July 2012. doi:10.1145/2335356.2335362. Google ScholarDigital Library
Index Terms
- Short paper: "here i am, now pay me!": privacy concerns in incentivised location-sharing systems
Recommendations
Short paper: the NetSANI framework for analysis and fine-tuning of network trace sanitization
WiSec '11: Proceedings of the fourth ACM conference on Wireless network securityAnonymization is critical prior to sharing wireless-network traces within the research community, to protect both personal and organizational sensitive information from disclosure. One difficulty in anonymization, or more generally, sanitization, is ...
A Comparative Study of Privacy Mechanisms and a Novel Privacy Mechanism [Short Paper]
Information and Communications SecurityAbstractPrivacy of PII(Personally Identifiable Information) on the Internet is a major concern of a netizen. On the Internet different service providers are supposed to publish their own privacy policies but understanding of these policies is a major ...
Privacy, Technology and Telehealth: Canadian Older Adults Voice Their Concerns
Human Aspects of IT for the Aged PopulationAbstractThis exploratory study examines older adults’ perceptions of privacy within the Canadian healthcare system, a system that is increasingly reliant on digital flows of information and mediated communication. We present the results from in-depth ...
Comments