skip to main content
10.1145/2627393.2627416acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
short-paper

Short paper: "here i am, now pay me!": privacy concerns in incentivised location-sharing systems

Published:23 July 2014Publication History

ABSTRACT

Social network sites, location-sharing services and, more recently, applications enabling the quantified self, mean that people are generating and sharing more data than ever before. It is important to understand the potential privacy impacts when such personal data are commercialised, to ensure that expectations of privacy are preserved. This paper presents the first user study of incentivised location sharing, where people are given a direct monetary incentive to share their location with a business or their social network. We use Nissenbaum's framework of contextual integrity in a preliminary user study (n=22) to investigate potential privacy risks with such services. We find that monetisation changes why people share their data, but not the frequency of disclosures. Our results motivate further study and are useful for designers of location-sharing systems and researchers who wish to leverage the diverse range of personal data that are available in a privacy-sensitive manner.

References

  1. D. Anthony, T. Henderson, and D. Kotz. Privacy in location-aware computing environments. IEEE Pervasive Computing, 6(4):64--72, Oct. 2007. doi:10.1109/mprv.2007.83. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. C. Aperjis and B. A. Huberman. A market for unbiased private data: Paying individuals according to their privacy attitudes. First Monday, 17(5--7), May 2012. doi:10.5210/fm.v17i5.4013.Google ScholarGoogle Scholar
  3. L. Barkhuus. The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI. In Proc. CHI, pages 367--376, May 2012. doi:10.1145/2207676.2207727. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. H. Cramer, M. Rost, and L. E. Holmquist. Performing a check-in: emerging practices, norms and "conflicts" in location-sharing using foursquare. In Proc. MobileHCI, pages 57--66, Aug. 2011. doi:10.1145/2037373.2037384. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. F. S. Grodzinsky and H. T. Tavani. Privacy in "the cloud": applying Nissenbaum's theory of contextual integrity. ACM SIGCAS Computers and Society, 41(1):38--47, Oct. 2011. doi:10.1145/2095266.2095270. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Grossklags and A. Acquisti. When 25 Cents is too much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information. In Proc. WEIS, 2007. Online at http://weis2007.econinfosec.org/papers/66.pdf.Google ScholarGoogle Scholar
  7. J. M. Hektner, J. A. Schmidt, and M. Csikszentmihalyi. Experience sampling method: measuring the quality of everyday life. SAGE Publications, Thousand Oaks, CA, USA, 2007.Google ScholarGoogle Scholar
  8. L. Hutton and T. Henderson. An architecture for ethical and privacy-sensitive social network experiments. SIGMETRICS Perform. Eval. Rev., 40(4):90--95, Apr. 2013. doi:10.1145/2479942.2479954. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. E. A. Jones and J. W. Janes. Anonymity in a world of digital books: Google Books, privacy, and the freedom to read. Policy & Internet, 2(4):42--74, Jan. 2010. doi:10.2202/1944--2866.1072.Google ScholarGoogle ScholarCross RefCross Ref
  10. P. G. Kelley, M. Benisch, L. F. Cranor, and N. Sadeh. When are users comfortable sharing locations with advertisers? In Proc. CHI, pages 2449--2452, May 2011. doi:10.1145/1978942.1979299. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Lindqvist, J. Cranshaw, J. Wiese, J. Hong, and J. Zimmerman. I'm the mayor of my house: examining why people use foursquare - a social-driven location sharing application. In Proc. CHI, pages 2409--2418, May 2011. doi:10.1145/1978942.1979295. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. H. R. Lipford, G. Hull, C. Latulipe, A. Besmer, and J. Watson. Visible flows: Contextual integrity and the design of privacy mechanisms on social network sites. In Proc. CSE, volume 4, pages 985--989, Aug. 2009. doi:10.1109/cse.2009.241. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. N. K. Malhotra, S. S. Kim, and J. Agarwal. Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4):336--355, Dec. 2004. doi:10.1287/isre.1040.0032 Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. M. McDonald and L. F. Cranor. The cost of reading privacy policies. I/S: A Journal of Law and Pol- icy for the Information Society, 4(3):540--565, 2008. Online at http://www.is-journal.org/files/2012/02/Cranor_Formatted_Final.pdf.Google ScholarGoogle Scholar
  15. C. C. Miller. Take a step closer for an invitation to shop. New York Times, page B4, Feb. 23 2010. Online at http://www.nytimes.com/2010/02/23/business/media/23adco.html.Google ScholarGoogle Scholar
  16. H. Nissenbaum. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford Law Books, Stanford, CA, USA, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. X. Page, B. P. Knijnenburg, and A. Kobsa. What a tangled web we weave: lying backfires in location-sharing social media. In Proc. CSCW, pages 273--284, 2013. doi:10.1145/2441776.2441808. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Patil, G. Norcie, A. Kapadia, and A. J. Lee. Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice. In Proc. Eighth Symposium on Usable Privacy and Security, July 2012. doi:10.1145/2335356.2335363. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. Rost, L. Barkhuus, H. Cramer, and B. Brown. Representation and Communication: Challenges in Interpreting Large Social Media Datasets. In Proc. CSCW, pages 357--362, 2013. doi:10.1145/2441776.2441817. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. R. Schlegel, A. Kapadia, and A. J. Lee. Eyeing your exposure: quantifying and controlling information sharing for improved privacy. In Proc. SOUPS, 2011. doi:10.1145/2078827.2078846. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. P. Shi, H. Xu, and Y. Chen. Using contextual integrity to examine interpersonal information boundary on social network sites. In Proc. CHI, pages 35--38, 2013. doi:10.1145/2470654.2470660. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. E. D. Spiegler, C. Hildebrand, and F. Michahelles. Social networks in pervasive advertising and shopping. In J. Müller, F. Alt, and D. Michelis, editors, Pervasive Advertising, chapter 10, pages 207--225. Springer, London, UK, 2011. doi:10.1007/978-0--85729--352--7_10.Google ScholarGoogle Scholar
  23. K. P. Tang, J. Lin, J. I. Hong, D. P. Siewiorek, and N. Sadeh. Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing. In Proc. Ubicomp, pages 85--94, Sept. 2010. doi:10.1145/1864349.1864363. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. E. Toch, J. Cranshaw, P. H. Drielsma, J. Y. Tsai, P. G. Kelley, J. Springfield, L. Cranor, J. Hong, and N. Sadeh. Empirical models of privacy in location sharing. In Proc. 12th ACMinternational conference on Ubiquitous computing, pages 129--138, Sept. 2010. doi:10.1145/1864349.1864364. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. J. Y. Tsai, P. Kelley, P. Drielsma, L. F. Cranor, J. Hong, and N. Sadeh. Who's viewed you?: The impact of feedback in a mobile location-sharing application. In Proc. CHI, pages 2003--2012, Apr. 2009. doi:10.1145/1518701.1519005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. R. Unni and R. Harmon. Perceived effectiveness of push vs. pull mobile location based advertising. Journal of Interactive Advertising, 7(2):28--40, 2007. doi:10.1080/15252019.2007.10722129.Google ScholarGoogle ScholarCross RefCross Ref
  27. B. Ur, P. G. Leon, L. F. Cranor, R. Shay, and Y. Wang. Smart, useful, scary, creepy: perceptions of online behavioral advertising. In Proc. SOUPS, July 2012. doi:10.1145/2335356.2335362. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Short paper: "here i am, now pay me!": privacy concerns in incentivised location-sharing systems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      WiSec '14: Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks
      July 2014
      246 pages
      ISBN:9781450329729
      DOI:10.1145/2627393

      Copyright © 2014 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 23 July 2014

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • short-paper

      Acceptance Rates

      WiSec '14 Paper Acceptance Rate25of96submissions,26%Overall Acceptance Rate98of338submissions,29%

      Upcoming Conference

      WiSec '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader