My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules

  • Sameer Patil
  • Yann Le Gall
  • Adam J. Lee
  • Apu Kapadia
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7398)

Abstract

The increasing inclusion of location and other contextual information in social media applications requires users to be more aware of what their location disclosures reveal. As such, it is important to consider whether existing access-control mechanisms for managing location sharing meet the needs of today’s users. We report on a questionnaire (N = 103) in which respondents were asked to specify location access control rules using free-form everyday language. Respondents also rated and ranked the importance of a variety of contextual factors that could influence their decisions for allowing or disallowing access to their location. Our findings validate some prior results (e.g., the recipient was the most highly rated and ranked factor and appeared most often in free-form rules) while challenging others (e.g., time-based constraints were deemed relatively less important, despite being features of multiple location-sharing services). We also identified several themes in the free-form rules (e.g., special rules for emergency situations). Our findings can inform the design of tools to empower end users to articulate and capture their access-control preferences more effectively.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Benisch, M., Kelley, P.G., Sadeh, N., Cranor, L.F.: Capturing Location-Privacy Preferences: Quantifying Accuracy and User-Burden Tradeoffs. Personal Ubiquitous Comput. 15, 679–694 (2011)CrossRefGoogle Scholar
  2. 2.
    Berendt, B., Günther, O., Spiekermann, S.: Privacy in e-Commerce: Stated Preferences vs. Actual Behavior. Communications of the ACM 48, 101–106 (2005)CrossRefGoogle Scholar
  3. 3.
    Brodie, C.A., Karat, C.M., Karat, J.: An Empirical Study of Natural Language Parsing of Privacy Policy Rules Using the SPARCLE Policy Workbench. In: Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006, pp. 8–19. ACM, New York (2006)CrossRefGoogle Scholar
  4. 4.
    Consolvo, S., Smith, I.E., Matthews, T., LaMarca, A., Tabert, J., Powledge, P.: Location Disclosure to Social Relations: Why, When, & What People Want to Share. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2005, pp. 81–90. ACM, New York (2005)CrossRefGoogle Scholar
  5. 5.
    Kapadia, A., Henderson, T., Fielding, J.J., Kotz, D.: Virtual Walls: Protecting Digital Privacy in Pervasive Environments. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 162–179. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  6. 6.
    Khan, R.M., Khan, M.A.: Academic Sojourners, Culture Shock and Intercultural Adaptation: A Trend Analysis. Studies About Languages 10, 38–46 (2007)Google Scholar
  7. 7.
    Kobsa, A., Patil, S., Meyer, B.: Privacy in instant messaging: An impression management model. Behaviour & Information Technology 31(4), 355–370 (2012)CrossRefGoogle Scholar
  8. 8.
    Lederer, S., Mankoff, J., Dey, A.K.: Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing. In: CHI 2003 Extended Abstracts on Human factors in Computing Systems, CHI EA 2003, pp. 724–725. ACM, New York (2003)CrossRefGoogle Scholar
  9. 9.
    Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research 15, 336–355 (2004)CrossRefGoogle Scholar
  10. 10.
    Miluzzo, E., Lane, N.D., Fodor, K., Peterson, R., Lu, H., Musolesi, M., Eisenman, S.B., Zheng, X., Campbell, A.T.: Sensing Meets Mobile Social Networks: The Design, Implementation and Evaluation of the CenceMe Application. In: SenSys 2008: Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems, pp. 337–350. ACM, New York (2008)CrossRefGoogle Scholar
  11. 11.
    Patil, S., Kobsa, A.: Instant Messaging and Privacy. In: Proceedings of HCI 2004, pp. 85–88 (2004), http://www.ics.uci.edu/~kobsa/papers/2004-HCI-kobsa.pdf
  12. 12.
    Patil, S., Kobsa, A.: Uncovering Privacy Attitudes and Practices in Instant Messaging. In: GROUP 2005: Proceedings of the 2005 International ACM SIGGROUP Conference on Supporting Group Work, pp. 109–112. ACM, New York (2005), doi:10.1145/1099203.1099220CrossRefGoogle Scholar
  13. 13.
    Patil, S., Lai, J.: Who Gets to Know What When: Configuring Privacy Permissions in an Awareness Application. In: CHI 2005: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 101–110. ACM, New York (2005), doi:10.1145/1054972.1054987CrossRefGoogle Scholar
  14. 14.
    Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., Rao, J.: Understanding and Capturing People’s Privacy Policies in a Mobile Social Networking Application. Personal and Ubiquitous Computing 13, 401–412 (2009)CrossRefGoogle Scholar
  15. 15.
    Schlegel, R., Kapadia, A., Lee, A.J.: Eyeing your Exposure: Quantifying and Controlling Information Sharing for Improved Privacy. In: Proceedings of the 2011 Symposium on Usable Privacy and Security (SOUPS) (July 2011)Google Scholar
  16. 16.
    Toch, E., Cranshaw, J., Drielsma, P.H., Tsai, J.Y., Kelley, P.G., Springfield, J., Cranor, L., Hong, J., Sadeh, N.: Empirical Models of Privacy in Location Sharing. In: Proceedings of the 12th ACM International Conference on Ubiquitous Computing, Ubicomp 2010, pp. 129–138. ACM, New York (2010)CrossRefGoogle Scholar
  17. 17.
    Toch, E., Cranshaw, J., Hankes-Drielsma, P., Springfield, J., Kelley, P.G., Cranor, L., Hong, J., Sadeh, N.: Locaccino: A Privacy-Centric Location Sharing Application. In: Proceedings of the 12th ACM International Conference Adjunct Papers on Ubiquitous Computing, Ubicomp 2010, pp. 381–382. ACM, New York (2010)CrossRefGoogle Scholar
  18. 18.
    Tsai, J.Y., Kelley, P., Drielsma, P., Cranor, L.F., Hong, J., Sadeh, N.: Who’s Viewed You?: The Impact of Feedback in a Mobile Location-Sharing Application. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, pp. 2003–2012. ACM, New York (2009)CrossRefGoogle Scholar
  19. 19.
    Wagner, D., Lopez, M., Doria, A., Pavlyshak, I., Kostakos, V., Oakley, I., Spiliotopoulos, T.: Hide and seek: Location Sharing Practices with Social Media. In: Proceedings of the 12th International Conference on Human Computer Interaction with Mobile Devices and Services, MobileHCI 2010, pp. 55–58. ACM, New York (2010)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Sameer Patil
    • 1
  • Yann Le Gall
    • 2
  • Adam J. Lee
    • 2
  • Apu Kapadia
    • 1
  1. 1.School of Informatics and ComputingIndiana UniversityBloomingtonUSA
  2. 2.Department of Computer ScienceUniversity of PittsburghPittsburghUSA

Personalised recommendations