Interaction and outeraction: instant messaging in action
CSCW '00 Proceedings of the 2000 ACM conference on Computer supported cooperative work
ConNexus to awarenex: extending awareness to mobile users
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Who wants to know what when? privacy preference determinants in ubiquitous computing
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Friendster and publicly articulated social networking
CHI '04 Extended Abstracts on Human Factors in Computing Systems
BT Technology Journal
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Who gets to know what when: configuring privacy permissions in an awareness application
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Developing privacy guidelines for social location disclosure applications and services
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Proceedings of the 7th international conference on Human computer interaction with mobile devices & services
Information revelation and privacy in online social networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
ECSCW'01 Proceedings of the seventh conference on European Conference on Computer Supported Cooperative Work
From awareness to repartee: sharing location within social groups
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Understanding and capturing people's privacy policies in a mobile social networking application
Personal and Ubiquitous Computing
Field deployment of IMBuddy: a study of privacy control and feedback mechanisms for contextual IM
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Locating family values: a field trial of the whereabouts clock
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Modeling people's place naming preferences in location sharing
Proceedings of the 12th ACM international conference on Ubiquitous computing
“Need to know”: examining information need in location discourse
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
UbiComp'05 Proceedings of the 7th international conference on Ubiquitous Computing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Turn-by-turn directions go social
Proceedings of Interacting with Sound Workshop: Exploring Context-Aware, Local and Social Audio Applications
Understanding how visual representations of location feeds affect end-user privacy concerns
Proceedings of the 13th international conference on Ubiquitous computing
A survey on privacy in mobile participatory sensing applications
Journal of Systems and Software
Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services
The effect of privacy on social presence in location-based mobile games
ICEC'11 Proceedings of the 10th international conference on Entertainment Computing
The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The implications of offering more disclosure choices for social location sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice
Proceedings of the Eighth Symposium on Usable Privacy and Security
Sense and sensibility in a pervasive world
Pervasive'12 Proceedings of the 10th international conference on Pervasive Computing
Attacking location privacy: exploring human strategies
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
We know where you live: privacy characterization of foursquare behavior
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Location-based reasoning about complex multi-agent behavior
Journal of Artificial Intelligence Research
Checking in or checked in: comparing large-scale manual and automatic location disclosure patterns
Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia
What a tangled web we weave: lying backfires in location-sharing social media
Proceedings of the 2013 conference on Computer supported cooperative work
Measuring networked social privacy
Proceedings of the 2013 conference on Computer supported cooperative work companion
When privacy and utility are in harmony: towards better design of presence technologies
Personal and Ubiquitous Computing
Using stranger as sensors: temporal and geo-sensitive question answering via social media
Proceedings of the 22nd international conference on World Wide Web
Trade area analysis using user generated mobile location data
Proceedings of the 22nd international conference on World Wide Web
Fine-grained sharing of sensed physical activity: a value sensitive approach
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Privacy manipulation and acclimation in a location sharing application
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
It takes a network to get dinner: designing location-based systems to address local food needs
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Hi-index | 0.00 |
The popularity of micro-blogging has made general-purpose information sharing a pervasive phenomenon. This trend is now impacting location sharing applications (LSAs) such that users are sharing their location data with a much wider and more diverse audience. In this paper, we describe this as social-driven sharing, distinguishing it from past examples of what we refer to as purpose-driven location sharing. We explore the differences between these two types of sharing by conducting a comparative two-week study with nine participants. We found significant differences in terms of users' decisions about what location information to share, their privacy concerns, and how privacy-preserving their disclosures were. Based on these results, we provide design implications for future LSAs.