An introduction to computerized experience sampling in psychology
Social Science Computer Review
America Calling: A Social History of the Telephone to 1940
America Calling: A Social History of the Telephone to 1940
Voice-mail diary studies for naturalistic data capture under mobile conditions
CSCW '02 Proceedings of the 2002 ACM conference on Computer supported cooperative work
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Trust: A Collision of Paradigms
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Who wants to know what when? privacy preference determinants in ubiquitous computing
CHI '03 Extended Abstracts on Human Factors in Computing Systems
A context-aware experience sampling tool
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Using the Experience Sampling Method to Evaluate Ubicomp Applications
IEEE Pervasive Computing
CSCW '04 Proceedings of the 2004 ACM conference on Computer supported cooperative work
Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Who gets to know what when: configuring privacy permissions in an awareness application
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
MyExperience: a system for in situ tracing and capturing of user feedback on mobile phones
Proceedings of the 5th international conference on Mobile systems, applications and services
Virtual walls: protecting digital privacy in pervasive environments
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
UbiComp'05 Proceedings of the 7th international conference on Ubiquitous Computing
The quest for personal control over mobile location privacy
IEEE Communications Magazine
The changing usage of a mature campus-wide wireless network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Who's viewed you?: the impact of feedback in a mobile location-sharing application
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Using Context Annotated Mobility Profiles to Recruit Data Collectors in Participatory Sensing
LoCA '09 Proceedings of the 4th International Symposium on Location and Context Awareness
Empirical models of privacy in location sharing
Proceedings of the 12th ACM international conference on Ubiquitous computing
Proceedings of the 12th ACM international conference on Ubiquitous computing
Locaccino: a privacy-centric location sharing application
Proceedings of the 12th ACM international conference adjunct papers on Ubiquitous computing - Adjunct
Protecting location privacy against inference attacks
Proceedings of the 17th ACM conference on Computer and communications security
Protecting location privacy against inference attacks
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Personal data vaults: a locus of control for personal data streams
Proceedings of the 6th International COnference
Toward a behavioral approach to privacy for online social networks
SocInfo'10 Proceedings of the Second international conference on Social informatics
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
In the best families: tracking and relationships
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Understanding how visual representations of location feeds affect end-user privacy concerns
Proceedings of the 13th international conference on Ubiquitous computing
Super-Ego: a framework for privacy-sensitive bounded context-awareness
CASEMANS '11 Proceedings of the 5th ACM International Workshop on Context-Awareness for Self-Managing Systems
The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The implications of offering more disclosure choices for social location sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Measuring user confidence in smartphone security and privacy
Proceedings of the Eighth Symposium on Usable Privacy and Security
Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice
Proceedings of the Eighth Symposium on Usable Privacy and Security
I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns
Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices
Short paper: location privacy: user behavior in the field
Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices
Understanding sharing preferences and behavior for mHealth devices
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
Preference-based location sharing: are more privacy options really better?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy manipulation and acclimation in a location sharing application
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Adaptive information-sharing for privacy-aware mobile social networks
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
A reflexive analysis of 'context' in privacy research: Two case studies in HIV care
International Journal of Human-Computer Studies
Crowdsourcing privacy preferences in context-aware applications
Personal and Ubiquitous Computing
Hi-index | 0.00 |
As location-aware and pervasive computing technologies become more prevalent, privacy concerns are becoming increasingly more important. User preferences about location privacy may depend on place, not only in terms of their physical location but also in terms of their social context: how they define where they are, what they are doing, and whom they are with at the time. Using the experience sampling method, the authors explored the privacy preferences of 25 users during one week. They found that participants were more willing to share location information when at home or alone than when at other locations or with friends. Most participants were consistent in their location privacy preferences across requester categories and regardless of place. Some participants, however, varied in their willingness to share location information depending on where they were, who they were with, and who was requesting the information. Those participants tended to be more concerned about privacy in general. These findings are useful for designing future privacy policies and user interfaces for pervasive computing. This article is part of a special issue on security and privacy.