The Community for Technology Leaders
RSS Icon
Issue No.04 - October-December (2007 vol.6)
pp: 64-72
Denise Anthony , Dartmouth College
Tristan Henderson , University of St Andrews
David Kotz , Dartmouth College
As location-aware and pervasive computing technologies become more prevalent, privacy concerns are becoming increasingly more important. User preferences about location privacy may depend on <it>place</it>, not only in terms of their physical location but also in terms of their <it>social context</it>: how they define where they are, what they are doing, and whom they are with at the time. Using the experience sampling method, the authors explored the privacy preferences of 25 users during one week. They found that participants were more willing to share location information when at home or alone than when at other locations or with friends. Most participants were consistent in their location privacy preferences across requester categories and regardless of place. Some participants, however, varied in their willingness to share location information depending on where they were, who they were with, and who was requesting the information. Those participants tended to be more concerned about privacy in general. These findings are useful for designing future privacy policies and user interfaces for pervasive computing. This article is part of a special issue on security and privacy.
privacy, location-dependent, location-sensitive, location-aware, pervasive computing
Denise Anthony, Tristan Henderson, David Kotz, "Privacy in Location-Aware Computing Environments", IEEE Pervasive Computing, vol.6, no. 4, pp. 64-72, October-December 2007, doi:10.1109/MPRV.2007.83
1. M. Reardon, "Mobile Phones that Track Your Buddies,",14 Nov. 2006, 2100-1039_3-6135209.html .
2. S. Patil and J. Lai, "Who Gets to Know What When: Configuring Privacy Permissions in an Awareness Application," Proc. SIGCHIConf. Human Factors in Computing Systems (CHI 05), ACM Press, 2005, pp. 101–110.
3. Q. He, D. Wu, and P. Khosla, "The Quest for Personal Control over Mobile Location Privacy," IEEE Comm., vol. 42, no. 5, 2004, pp. 130–136.
4. A. Kapadia et al., "Virtual Walls: Protecting Digital Privacy in Pervasive Environments," Proc. 5th Int'l Conf. Pervasive Computing (Pervasive 07), Springer, 2007, pp. 162–179.
5. S. Lederer, J. Hong, and A. Dey, "Personal Privacy through Understanding and Action: Five Pitfalls for Designers," Personal and Ubiquitous Computing, Nov. 2004, pp. 440–454.
6. H. Nissenbaum, "Privacy as Contextual Integrity," Washington Law Rev., vol. 79, no. 1, 2004, pp. 119–158.
7. C.S. Fischer, America Calling: A Social History of the Telephone to 1940, Univ. of California Press, 1992.
8. Q. Jones et al., "Putting Systems into Place: A Qualitative Study of Design Requirements for Location-Aware Community Systems," Proc. ACM Conf. Computer Supported Cooperative Work (CSCW 04), ACM Press, 2004, pp. 202–211.
9. L.J. Camp, H. Nissenbaum, and C. McGrath, "Trust: A Collision of Paradigms," Proc. 5th Int'l Conf. Financial Cryptography (FC 01), LNCS 2339, Springer, 2002, pp. 91–105.
10. S. Lederer, J. Mankoff, and A.K. Dey, "Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing," Proc. Conf. Human Factors in Computing Systems (CHI 03), ACM Press, 2003, pp. 724–725.
11. S. Consolvo et al., "Location Disclosure to Social Relations: Why, When and What People Want to Share," Proc. SIGCHIConf. Human Factors in Computing Systems (CHI 05), ACM Press, 2005, pp. 81–90.
12. T.F. Gieryn, "A Space for Place in Sociology," Ann. Rev. of Sociology, Aug. 2000, pp. 463–496.
13. G. Iachello et al., "Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service," Proc. Ubiquitous Computing (UbiComp 05), LNCS 3660, Springer, 2005, pp. 213–231.
14. J. Meyerowitz, No Sense of Place: The Impact of Electronic Media on Social Behavior, Oxford University Press, 1985.
15. T. Henderson, D. Anthony, and D. Kotz, "Measuring Wireless Network Usage with the Experience Sampling Method," Proc. 1st Workshop Wireless Network Measurements (WiNMee 05), Int'l Comm. Sciences and Technology Assoc., 2005; .
16. L. Palen and P. Dourish, "Unpacking 'Privacy' for a Networked World," Proc. Conf. Human Factors in Computing Systems (CHI 03), ACM Press, 2003, pp. 129–136.
17 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool