skip to main content
10.1145/3503823.3503857acmotherconferencesArticle/Chapter ViewAbstractPublication PagespciConference Proceedingsconference-collections
research-article

Can social gamification and privacy co-exist? Identifying the major concerns

Published: 22 February 2022 Publication History

Abstract

Abstract: The provision of attractive online services in various socio-economical domains offers several benefits in users’ activities. Gamification is an acknowledged method for designing such services, as with the implementation of game elements, a gameful interactive environment can be developed. Its implementation has been recorded in sectors, such as education, health, and social media. Specifically, the interrelation of social media and gamification, which increases users’ engagement, has been indicated in the new notion of social gamification. Under this engagement, users’ information is collected, stored and processed, often leading to their privacy violation. The protection of users’ privacy is an important aspect to be considered while using gamification in social media. Considering the increasing use of social media, Social Gamification should focus not only on users’ engagement but also on their privacy protection. In this work, the interdependencies among game elements and users’ social attributes are identified, as principles of social gamification. Taking under consideration that the recorded privacy violations occur individually by these principles, the aim is to examine if social gamification creates more implications on privacy, by analyzing these two areas by one common interrelation.

References

[1]
S. Deterding, D. Dixon, R. Khaled, and L. Nacke, “From game design elements to gamefulness: defining ‘gamification,’” p. 7.
[2]
J. R. Chapman and P. J. Rich, “Does educational gamification improve students’ motivation? If so, which game elements work best?,” Journal of Education for Business, vol. 93, no. 7, pp. 315–322, Oct. 2018.
[3]
K. Huotari and J. Hamari, “Defining gamification: a service marketing perspective,” in Proceeding of the 16th International Academic MindTrek Conference on - MindTrek ’12, Tampere, Finland, 2012, p. 17.
[4]
J. A. Cafazzo, M. Casselman, N. Hamming, D. K. Katzman, and M. R. Palmert, “Design of an mHealth App for the Self-management of Adolescent Type 1 Diabetes: A Pilot Study,” J Med Internet Res, vol. 14, no. 3, p. e70, May 2012.
[5]
B. Vasilescu, “Human aspects, gamification, and social media in collaborative software engineering,” in Companion Proceedings of the 36th International Conference on Software Engineering, Hyderabad India, May 2014, pp. 646–649.
[6]
H. Pellikka, “Gamification in Social Media,” p. 57.
[7]
M. Swanson, “Social Gamification, Mobile Apps, Personalization - Gamification 2021.” https://www.gamify.com/gamification-blog/gamification-in-2021-a-more-mature-approach-pt-2 (accessed Sep. 15, 2021).
[8]
D. Virgillito, “10 Facebook Gamification Examples You Need To Learn From,” 2015. [Online]. Available: https://adespresso.com/blog/10-facebook-gamification-examples-you-need-to-learn-from/
[9]
X. Li, “The Gamification of Dating: Tinder and Game-playing on Reddit communities A thesis presented,” The University of Melbourne, Accessed: Oct. 03, 2021. [Online]. Available: https://www.academia.edu/38730044/The_Gamification_of_Dating_Tinder_and_Game_playing_on_Reddit_communities_A_thesis_presented
[10]
W. Hannah, “The Gamification of Social Media,” 2019. [Online]. Available: https://www.meltwater.com/en/blog/the-gamification-of-social-media
[11]
G. Aydin, “Adoption of Gamified Systems: A Study on a Social Media Gamification Website,” International Journal of Online Marketing, vol. 5, no. 3, pp. 18–37, Jul. 2015.
[12]
H. Williams, “The Gamification of Social Media,” Meltwater, Jan. 13, 2019. https://www.meltwater.com/en/blog/the-gamification-of-social-media (accessed Sep. 15, 2021).
[13]
F. Musso and E. Druica, Eds., Handbook of Research on Retailer-Consumer Relationship Development: IGI Global, 2014.
[14]
“9 Examples of Apps Using Gamification for User Engagement,” GetSocial, Jan. 27, 2021. https://www.getsocial.im/blog/is-gamification-the-only-way-for-apps-to-survive/ (accessed Sep. 15, 2021).
[15]
Z. Papacharissi and E. Easton, “In the Habitus of the New,” in A Companion to New Media Dynamics, John Wiley & Sons, Ltd, 2013, pp. 167–184.
[16]
A. E. Marwick and danah boyd, “Networked privacy: How teenagers negotiate context in social media,” New Media & Society, vol. 16, no. 7, pp. 1051–1067, Nov. 2014.
[17]
A.-G. Mavroeidi, A. Kitsiou, C. Kalloniatis, and S. Gritzalis, “Gamification vs. Privacy: Identifying and Analysing the Major Concerns,” Future Internet, vol. 11, no. 3, p. 67, Mar. 2019.
[18]
A. Pattakou, C. Kalloniatis, and S. Gritzalis, “Security and Privacy Requirements Engineering Methods for Traditional and Cloud-Based Systems: A Review,” CLOUD COMPUTING, p. 7, 2017.
[19]
A. Pattakou, A.-G. Mavroeidi, V. Diamantopoulou, C. Kalloniatis, and S. Gritzalis, “Towards the Design of Usable Privacy by Design Methodologies,” in 2018 IEEE 5th International Workshop on Evolving Security & Privacy Requirements Engineering (ESPRE), Banff, AB, Aug. 2018, pp. 1–8.
[20]
C. Kalloniatis, P. Belsis, and S. Gritzalis, “A soft computing approach for privacy requirements engineering: The PriS framework,” Applied Soft Computing, vol. 11, no. 7, pp. 4341–4348, Oct. 2011.
[21]
C. Kalloniatis, E. Kavakli, and S. Gritzalis, “Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process,” in The Second International Conference on Availability, Reliability and Security (ARES’07), Vienna, Apr. 2007, pp. 1009–1017.
[22]
M. Deng, K. Wuyts, R. Scandariato, B. Preneel, and W. Joosen, “A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements,” Requirements Eng, vol. 16, no. 1, pp. 3–32, Mar. 2011.
[23]
N. Argyropoulos, C. Kalloniatis, H. Mouratidis, and A. Fish, “Incorporating privacy patterns into semi-automatic business process derivation,” in 2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS), Grenoble, France, Jun. 2016, pp. 1–12.
[24]
K. Vgena, A. Kitsiou, C. Kalloniatis, and D. Kavroudakis, “Do Identity and Location Data Interrelate? New Affiliations and Privacy Concerns in Social-Driven Sharing,” in Trust, Privacy and Security in Digital Business, vol. 11711, S. Gritzalis, E. R. Weippl, S. K. Katsikas, G. Anderst-Kotsis, A. M. Tjoa, and I. Khalil, Eds. Cham: Springer International Publishing, 2019, pp. 3–16.
[25]
Vgena, Kitsiou, Kalloniatis, Kavroudakis, and Gritzalis, “Toward Addressing Location Privacy Issues: New Affiliations with Social and Location Attributes,” Future Internet, vol. 11, no. 11, p. 234, Nov. 2019.
[26]
R. Jenkins, Social identity, 3rd ed. London ; New York: Routledge, 2008.
[27]
S. Lahlou, “Identity, social status, privacy and face-keeping in digital society,” Social Science Information, vol. 47, no. 3, pp. 299–330, Sep. 2008.
[28]
J. Li, H. Yan, Z. Liu, X. Chen, X. Huang, and D. S. Wong, “Location-sharing systems with enhanced privacy in mobile online social networks,” IEEE Systems Journal, vol. 11, no. 2, pp. 439–448, 2017.
[29]
A. Kitsiou, E. Tzortzaki, C. Kalloniatis, and S. Gritzalis, “Identifying Privacy Related Requirements for the Design of Self-Adaptive Privacy Protections Schemes in Social Networks,” Future Internet, vol. 13, no. 2, Art. no. 2, Feb. 2021.
[30]
C. Kalloniatis, E. Kavakli, and S. Gritzalis, “Addressing privacy requirements in system design: the PriS method,” Requirements Eng, vol. 13, no. 3, pp. 241–255, Sep. 2008.
[31]
K. Seaborn and D. I. Fels, “Gamification in theory and action: A survey,” International Journal of Human-Computer Studies, vol. 74, pp. 14–31, Feb. 2015.
[32]
Z. H. Morford, B. N. Witts, K. J. Killingsworth, and M. P. Alavosius, “Gamification: The Intersection between Behavior Analysis and Game Design Technologies,” BEHAV ANALYST, vol. 37, no. 1, pp. 25–40, May 2014.
[33]
K. Werbach and D. Hunter, For the win: how game thinking can revolutionize your business. Philadelphia: Wharton Digital Press, 2012.
[34]
M. M. Gåsland, “Game Mechanic based E-Learning,” p. 93.
[35]
G. Lucassen and S. Jansen, “Gamification in Consumer Marketing - Future or Fallacy?,” Procedia - Social and Behavioral Sciences, vol. 148, pp. 194–202, Aug. 2014.
[36]
C. R. Nevin, “Gamification as a tool for enhancing graduate medical education,” Postgrad Med J, vol. 90, no. 1070, pp. 685–693, Dec. 2014.
[37]
R. McDaniel, R. Lindgren, and J. Friskics, “Using badges for shaping interactions in online learning environments,” in 2012 IEEE International Professional Communication Conference, Orlando, FL, USA, Oct. 2012, pp. 1–4.
[38]
S. K. Bista, S. Nepal, and C. Paris, “Engagement and Cooperation in Social Networks: Do Benefits and Rewards Help?,” in 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, United Kingdom, Jun. 2012, pp. 1405–1410.
[39]
C. Cheong, F. Cheong, and J. Filippou, “Quick Quiz: A Gamified Approach for Enhancing Learning,” p. 15.
[40]
B. Morschheuser, J. Hamari, K. Werder, and J. Abe, “How to Gamify? A Method For Designing Gamification,” presented at the Hawaii International Conference on System Sciences, 2017.
[41]
B. Morschheuser, L. Hassan, K. Werder, and J. Hamari, “How to design gamification? A method for engineering gamified software,” Information and Software Technology, vol. 95, pp. 219–237, Mar. 2018.
[42]
Y. Chen and P. Pu, “HealthyTogether: exploring social incentives for mobile fitness applications,” in Proceedings of the Second International Symposium of Chinese CHI on - Chinese CHI ’14, Toronto, Ontario, Canada, 2014, pp. 25–34.
[43]
A. Ahtinen, “Mobile Mental Wellness Training for Stress Management: Feasibility and Design Implications Based on a One-Month Field Study,” JMIR Mhealth Uhealth, vol. 1, no. 2, p. e11, Jul. 2013.
[44]
L. C. Amo, R. Liao, H. R. Rao, and G. Walker, “Effects of Leaderboards in Games on Consumer Engagement,” in Proceedings of the 2018 ACM SIGMIS Conference on Computers and People Research - SIGMIS-CPR’18, Buffalo-Niagara Falls, NY, USA, 2018, pp. 58–59.
[45]
J. Hamari, J. Koivisto, and H. Sarsa, “Does Gamification Work? – A Literature Review of Empirical Studies on Gamification,” in 2014 47th Hawaii International Conference on System Sciences, Waikoloa, HI, Jan. 2014, pp. 3025–3034.
[46]
A.-G. Mavroeidi, A. Kitsiou, and C. Kalloniatis, “The Role of Gamification in Privacy Protection and User Engagement,” in Ethics, Laws, and Policies for Privacy, Security, and Liability [Working Title], IntechOpen, 2020.
[47]
A.-G. Mavroeidi, A. Kitsiou, and C. Kalloniatis, “The Interrelation of Game Elements and Privacy Requirements for the Design of a System: A Metamodel,” in Trust, Privacy and Security in Digital Business, vol. 11711, S. Gritzalis, E. R. Weippl, S. K. Katsikas, G. Anderst-Kotsis, A. M. Tjoa, and I. Khalil, Eds. Cham: Springer International Publishing, 2019, pp. 110–125.
[48]
K. Vgena, A. Kitsiou, C. Kalloniatis, and D. Kavroudakis, “Do Identity and Location Data Interrelate? New Affiliations and Privacy Concerns in Social-Driven Sharing,” in Trust, Privacy and Security in Digital Business, vol. 11711, S. Gritzalis, E. R. Weippl, S. K. Katsikas, G. Anderst-Kotsis, A. M. Tjoa, and I. Khalil, Eds. Cham: Springer International Publishing, 2019, pp. 3–16.
[49]
Vgena, Kitsiou, Kalloniatis, Kavroudakis, and Gritzalis, “Toward Addressing Location Privacy Issues: New Affiliations with Social and Location Attributes,” Future Internet, vol. 11, no. 11, p. 234, Nov. 2019.

Cited By

View all
  • (2022)Determining the Role of Social Identity Attributes to the Protection of Users’ Privacy in Social MediaFuture Internet10.3390/fi1409024914:9(249)Online publication date: 24-Aug-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
PCI '21: Proceedings of the 25th Pan-Hellenic Conference on Informatics
November 2021
499 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 February 2022

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

PCI 2021

Acceptance Rates

Overall Acceptance Rate 190 of 390 submissions, 49%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)27
  • Downloads (Last 6 weeks)2
Reflects downloads up to 27 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Determining the Role of Social Identity Attributes to the Protection of Users’ Privacy in Social MediaFuture Internet10.3390/fi1409024914:9(249)Online publication date: 24-Aug-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media