skip to main content
10.1145/2675133.2675179acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article

Do Birds of a Feather Watch Each Other?: Homophily and Social Surveillance in Location Based Social Networks

Published:28 February 2015Publication History

ABSTRACT

Location sharing applications (LSA) have proliferated in recent years. Current research principally focuses on egocentric privacy issues and design but has historically not explored the impact of surveillance on location sharing behavior. In this paper, we examine homophily in friendship and surveillance networks for 65 foursquare users. Our results indicate that location surveillance networks are strongly homophilous along the lines of race and gender while friendship networks are weakly homophilous on income. Qualitatively, an analysis of comments and interviews provides support for a discourse around location surveillance, which is mainly social, collaborative, positive and participatory. We relate these findings with prior literature on surveillance, self-presentation and homophily and situate this study in existing HCI/CSCW scholarship.

References

  1. Albrechtslund, A. Online social networking as participatory surveillance. First Monday,13, 3 (2008).Google ScholarGoogle ScholarCross RefCross Ref
  2. Andrejevic, M. The discipline of watching: Detection, risk, and lateral surveillance. Critical Studies in Media Communication, 23,5 (2006), 391--407.Google ScholarGoogle ScholarCross RefCross Ref
  3. Backstrom, L., Huttenlocher, D., Kleinberg, J., & Lan, X. Group formation in large social networks: membership, growth, and evolution. In Proc. SIGKDD (2006). 44--54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Barkhuus, L., Brown, B., Bell, M., Sherwood, S., Hall, M., & Chalmers, M. From awareness to repartee: sharing location within social groups. In Proc. CHI (2008), 497506. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Barkhuus, L.The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI. In Proc. CHI (2012), 367--376. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Benisch, M., Kelley, P. G., Sadeh, N., & Cranor, L. F. Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs. PUC, 15,7 (2011), 679--694. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Boesen, J., Rode, J. A., & Mancini, C. The domestic panopticon: location tracking in families. In Proc. Ubicomp (2010), 65--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Brush, A. J., Krumm, J., & Scott, J. Exploring end user preferences for location obfuscation, location-based services, and the value of location. In Proc. Ubicomp (2010), 95--104. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Brown, B., Taylor, A. S., Izadi, S., Sellen, A., Jofish-Kaye, J., & Eardley, R. Locating family values: A field trial of the Whereabouts Clock. In Ubicomp (2007), 354--371. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Consolvo, S., Smith, I. E., Matthews, T., LaMarca, A., Tabert, J., & Powledge, P. Location disclosure to social relations: why, when, & what people want to share. In Proc. CHI (2005), 81--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Cramer, H., Rost, M., & Holmquist, L. E. Performing a check-in: emerging practices, norms and 'conflicts' in location-sharing using foursquare. In Proc. Mobile HCI (2011), 57--66. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Dourish, P.Implications for design. In Proc. CHI (2006), 541--550. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. e Silva, A. D. S., & Frith, J. Mobile interfaces in public spaces: Locational privacy, control, and urban sociability. Taylor & Francis, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  14. foursquare. URL: https://foursquare.com/about/Google ScholarGoogle Scholar
  15. foursquare platform feature descriptions. URL: https://support.foursquare.com/hc/en-usGoogle ScholarGoogle Scholar
  16. Glaser, B., & Strauss, A. The discovery of grounded theory. Weidenfield & Nicolson, London, 1967.Google ScholarGoogle Scholar
  17. Guha, S., & Birnholtz, J. Can you see me now?: location, visibility and the management of impressions on foursquare. In Proc. Mobile HCI (2013), 183--192. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Hanneman, R. A., and Riddle, M.Introduction to social network methods. University of California, Riverside, 2005.Google ScholarGoogle Scholar
  19. Humphreys, L. Mobile social networks and social practice: A case study of Dodgeball. JCMC, 13, 1 (2007), 341--360.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Humphreys, L. Mobile social networks and urban public space. New Media & Society, 12, 5 (2010), 763--778.Google ScholarGoogle ScholarCross RefCross Ref
  21. Humphreys, L. Who's watching whom? A study of interactive technology and surveillance. Journal of Communication, 61, 4 (2011), 575--595.Google ScholarGoogle ScholarCross RefCross Ref
  22. Iachello, G., Smith, I., Consolvo, S., Chen, M., & Abowd, G. D.Developing privacy guidelines for social location disclosure applications and services. In Proc. SOUPS (2005), 65--76. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Iachello, G., & Hong, J. End-user privacy in humancomputer interaction. Foundations and Trends in HumanComputer Interaction, 1, 1 (2007), 1--137. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Lewis, K., Gonzalez, M., & Kaufman, J. Social selection and peer influence in an online social network. Proceedings of the National Academy of Sciences, 109, 1 (2012), 68--72.Google ScholarGoogle ScholarCross RefCross Ref
  25. Lindqvist, J., Cranshaw, J., Wiese, J., Hong, J., & Zimmerman, J. I'm the mayor of my house: examining why people use foursquare-a social-driven location sharing application. In Proc. CHI (2011). 2409--2418. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Lingel, J., & Naaman, M. 2014. City, self, network: transnational migrants and online identity work. In Proc. CSCW (2014), 1502--1510. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Lyon, D. Surveillance Studies: An Overview. Polity Press, Cambridge, 2007.Google ScholarGoogle Scholar
  28. Marwick, A. E. The Public Domain: Social Surveillance in Everyday Life. Surveillance & Society, 9, 4 (2012).Google ScholarGoogle ScholarCross RefCross Ref
  29. McCorkel, J. A. Embodied surveillance and the gendering of punishment. Journal of Contemporary Ethnography, 32, 1 (2003), 41--76.Google ScholarGoogle ScholarCross RefCross Ref
  30. McPherson, M., Smith-Lovin, L., & Cook, J. M. Birds of a feather: Homophily in social networks. Annual Review of Sociology, 27 (2001), 415--444.Google ScholarGoogle ScholarCross RefCross Ref
  31. Nissenbaum, H. Privacy as contextual integrity. Wash. L. Rev., 79, (2004) 119.Google ScholarGoogle Scholar
  32. Opsahl, T. Structure and Evolution of Weighted Networks. University of London (Queen Mary College), London, UK, (2009), 104--122. URL: http://toreopsahl.com/tnet/Google ScholarGoogle Scholar
  33. Pavlovskaya, M., & Martin, K. S. Feminism and geographic information systems: From a missing object to a mapping subject. Geography Compass, 1, 3 (2007), 583--606.Google ScholarGoogle ScholarCross RefCross Ref
  34. Page, X., Knijnenburg, B. P., & Kobsa, A.What a tangled web we weave: lying backfires in location-sharing social media. In Proc. CSCW (2013), 273--284. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Patil, S., Norcie, G., Kapadia, A., & Lee, A. J. Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice. In Proc. SOUPS (2012), 5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Patil, S., Schlegel, R., Kapadia, A., & Lee, A. J. Reflection or action?: how feedback and control affect location sharing decisions. In Proc. CHI (2014), 101--110. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Reilly, D., Dearman, D., Ha, V., Smith, I., & Inkpen, K. "Need to know": examining information need in location discourse. Pervasive Computing, (2006), 33--49. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Shalizi, C. R., & Thomas, A. C. Homophily and contagion are generically confounded in observational social network studies. Soc. Methods & Research, 40, 2 (2011), 211--239.Google ScholarGoogle ScholarCross RefCross Ref
  39. Smith, I.Consolvo, S., Lamarca, A., Hightower, J., Scott, J., Sohn, T.,Hughes,J,Iachello,G and Abowd, G. D. Social disclosure of place: From location technology to communication practices. Pervasive Computing, (2005), 134--151. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Stuart, H. C., Dabbish, L., Kiesler, S., Kinnaird, P., & Kang, R. Social transparency in networked information exchange: a theoretical framework. In Proc. CSCW (2012), 451--460. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Tang, K. P., Lin, J., Hong, J. I., Siewiorek, D. P., & Sadeh, N. Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing. In Proc. Ubicomp (2010), 85--94. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Tang, K., Hong, J., & Siewiorek, D. The implications of offering more disclosure choices for social location sharing. In Proc. CHI (2012), 391--394. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Toch, E., Cranshaw, J., Hankes-Drielsma, P., Springfield, J., Kelley, P. G., Cranor, L.,Hong,J. and Sadeh, N. Locaccino: a privacy-centric location sharing application. In Proc. Ubicomp-Adjunct (2010), 381--382. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Trottier, D. Interpersonal surveillance on social media. Canadian Journal of Communication, 37, 2 (2012).Google ScholarGoogle ScholarCross RefCross Ref
  45. Tsai, J. Y., Kelley, P., Drielsma, P., Cranor, L. F., Hong, J., & Sadeh, N. Who's viewed you?: the impact of feedback in a mobile location-sharing application.In Proc. CHI (2009),2003--2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Want, R., Hopper, A., Falcao, V., & Gibbons, J. The active badge location system. ACM Transactions on Information Systems, 10, 1 (1992), 91--102. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Wicker, S. B. Cellular Convergence and the Death of Privacy. Oxford University Press, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  48. Wiese, J., Kelley, P. G., Cranor, L. F., Dabbish, L., Hong, J. I., & Zimmerman, J. Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share. In Proc. Ubicomp (2011), 197--206. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Wilson, S., Cranshaw, J., Sadeh, N., Acquisti, A., Cranor, L. F., Springfield, J.,Jeong, S.Y. and Balasubramanian, A. Privacy manipulation and acclimation in a location sharing application. In Proc. Ubicomp (2013). 549--558. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Yuan, Y. C. and Gay, G. Homophily of Network Ties and Bonding and Bridging Social Capital in ComputerMediated Distributed Teams. JCMC, 11, 4 (2006), 1062--1084.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Do Birds of a Feather Watch Each Other?: Homophily and Social Surveillance in Location Based Social Networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CSCW '15: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing
      February 2015
      1956 pages
      ISBN:9781450329224
      DOI:10.1145/2675133

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 February 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CSCW '15 Paper Acceptance Rate161of575submissions,28%Overall Acceptance Rate2,235of8,521submissions,26%

      Upcoming Conference

      CSCW '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader