Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service

  • Giovanni Iachello
  • Ian Smith
  • Sunny Consolvo
  • Gregory D. Abowd
  • Jeff Hughes
  • James Howard
  • Fred Potter
  • James Scott
  • Timothy Sohn
  • Jeffrey Hightower
  • Anthony LaMarca
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3660)


We report on a two-week deployment of a peer-to-peer, mobile, location-enhanced messaging service. This study is specifically aimed at investigating the need for and effectiveness of automatic location disclosure mechanisms, the emerging strategies to achieve plausible deniability, and at understanding how place and activity are used to communicate plans, intentions and provide awareness. We outline the research that motivated this study, briefly describe the application we designed, and provide details of the evaluation process. The results show a lack of value of automatic messaging functions, confirm the need for supporting plausible deniability in communications, and highlight the prominent use of activity instead of place to indicate one’s location. Finally, we offer suggestions for the development of social mobile applications.


Cell Phone Privacy Concern Automatic Feature Social Network Size Email Survey 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Barkhuus, L., Dey, A.: Location-Based Services For Mobile Telephony: A Study Of Users’ Privacy Concerns. In: Proc. Interact 2003, pp. 709–712. IOS Press, Amsterdam (2003)Google Scholar
  2. 2.
    Benford, S., Seager, W., Flintham, M., Anastasi, R., Rowland, D., Humble, J., Stanton, D., Bowers, J., Tanadavanitj, N., Adams, M., Farr, J.R., Oldroyd, A., Sutton, J.: The Error of Our Ways: The Experience of Self-Reported Position in a Location-Based Game. In: Davies, N., Mynatt, E.D., Siio, I. (eds.) UbiComp 2004. LNCS, vol. 3205, pp. 70–87. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  3. 3.
    Brown, K.: On The Trail Of Location Services. Wireless Week, Reed Business Information 18,March 1 (2004)Google Scholar
  4. 4.
    Consolvo, S., Smith, I., Matthews, T., LaMarca, A., Tabert, J., Powledge, P.: Location Disclosure to Social Relations: Why, When, & What People Want to Share. In: Proc. CHI 2005, pp. 82–90. ACM Press, New York (2005)Google Scholar
  5. 5.
    DePaulo, B.M., Kashy, D.A.: Everyday Lies in Close and Casual Relationships. Journal of Personality and Social Psychology,American Psychological Association  74 (1), 63–79 (1998)Google Scholar
  6. 6.
    Flintham, M., Anastasi, R., Benford, S.D., Hemmings, T., Crabtree, A., Greenhalgh, C.M., Rodden, T.A., Tandavanitj, N., Adams, M., Row-Farr, J.: Where On-Line Meets On- The-Streets: Experiences With Mobile Mixed Reality Games. In: Proc. CHI 2003, pp. 569–576. ACM Press, New York (2003)Google Scholar
  7. 7.
    Grinter, R.E., Eldridge, M.: y do tngrs luv 2 txt msg? In: Proc. ECSCW 2001, pp. 219–238. Kluwer Academic Publishers, Dordrecht (2001)Google Scholar
  8. 8.
    Hancock, J.T., Thom-Santelli, J., Ritchie, T.: Deception and Design: The Impact of Communication Technology on Lying Behavior. In: Proc. CHI 2004, pp. 129–134. ACM Press, New York (2004)Google Scholar
  9. 9.
    Harrison, S., Dourish, P.: Re-place-ing Space: The Roles Of Space And Place In Collaborative Systems. In: Proc. CSCW 1996, pp. 67–76. ACM Press, New York (1996)CrossRefGoogle Scholar
  10. 10.
    Höflich, J.R., Rössler, P.: Mobile schriftliche Kommunikation – oder: E-Mail für das Handy. In: Die Bedeutung elektronischer Kurznachrichten (Short Message Service) am Beispiel jugendlicher Handynutzer. Medien & Kommunikationswissenschaft, vol. 49, p. 437. Nomos- Verlag (2001)Google Scholar
  11. 11.
    Hull, R., Kumar, B., Lieuwen, D., Patel-Schneider, D.F., Sahuguet, A., Varadarajan, S., Vyas, A.: Enabling Context-Aware and Privacy-Conscious User Data Sharing. In: Proc. MDM 2004, pp. 187–198. IEEE Computer Society Press, Los Alamitos (2004)Google Scholar
  12. 12.
    Iachello, G., Abowd, G.D.: Privacy and Proportionality: Adapting Legal Evaluation Techniques to Inform Design In Ubiquitous Computing. In: Proc. CHI 2005, pp. 91–100. ACM Press, New York (2005)Google Scholar
  13. 13.
    Informa Telecoms & Media: What the Operators Are Doing. Mobile Location Analyst (October 2003), Available online:
  14. 14.
    Ito, M., Daisuke, O.: Mobile Phones, Japanese Youth and the Replacement of Social Contact. In: Ling, R., Pedersen, P. (eds.) Front Stage/Back Stage: Mobile Communication and the Renegotiation of the Social Sphere, Conference Proceedings, Grimstad, Norway, June 2003, pp. 22–24 (2003)Google Scholar
  15. 15.
    Jensen, L., Jensen, J., Feldman, S., Cauffman, E.: The Right to Do Wrong: Lying to Parents Among Adolescents and Emerging Adults. Journal of Youth and Adolescence 33(2), 101–112 (2004)CrossRefGoogle Scholar
  16. 16.
    KDDI: GPS MAP, a Location Service For Mobile Phones, Available online:
  17. 17.
    Knox, D., Zusman, M.E., McGinty, K., Gescheidler, J.: Deception of Parents During Adolescence. Adolescence 36(143), 611–614 (2001)Google Scholar
  18. 18.
    Laasonen, K., Raento, M., Toivonen, H.: Adaptive On-Device Location Recognition. In: Ferscha, A., Mattern, F. (eds.) PERVASIVE 2004. LNCS, vol. 3001, pp. 287–304. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  19. 19.
    Lederer, S., Mankoff, J., Dey, A.K.: Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing. In: Proc. CHI 2003, pp. 724–725. ACM Press, New York (2003)Google Scholar
  20. 20.
    Ling, R.: The Social and Cultural Consequences of Mobile Telephony as Seen in the Norwegian Context. Telenor R&D Report R 9/2002, ISSN 1500-2616 (2002)Google Scholar
  21. 21.
    Laurier, E.: Why People Say Where They Are During Mobile Phone Calls. In: Laurier, E. (ed.) Environment and Planning D: Society and Space, Pion, vol. 19, pp. 485–504 (2001)Google Scholar
  22. 22.
    Mapamobile: Available online:
  23. 23.
    Mynatt, E., Tullio, J.: Inferring calendar event attendance. In: Proc. ACM Conference on Intelligent User Interfaces (IUI 2001), pp. 121–128 (2001)Google Scholar
  24. 24.
    DoCoMo, N.T.T.: iArea: Location Based Services ,Available online:
  25. 25.
    Palen, L., Dourish, P.: Unpacking “Privacy” for a Networked World. In: Proc. CHI 2003, pp. 129–136. ACM Press, New York (2003)Google Scholar
  26. 26.
    Povey, D.: Optimistic Security: A New Access Control Paradigm. In: Proc. New Security Paradigms Workshop 1999, pp. 40–45. ACM Press, Ontario (1999)Google Scholar
  27. 27.
    Reichenbach, M., Damker, H., Federrath, H., Rannenberg, K.: Individual Management of Personal Reachability in Mobile Communication. In: Yngström, L., Carlsen, J. (eds.) Information Security in Research and Business, IFIP TC11 13th International Conference on Information Security (SEC 1997), pp. 164–174. Chapman and Hall, Boca Raton (1997)Google Scholar
  28. 28.
    Schegloff, E.A.: Notes on a Conversational Practice: Formulating Place. In: Sudnow, D. (ed.) Studies in Social Interaction, pp. 75–119. The Free Press (1972)Google Scholar
  29. 29.
    Smith, H., Rogers, Y., Brady, M.: Managing One’s Social Network: Does Age Make a Difference? In: Proc. Interact 2003, pp. 551–558. IOS Press, Amsterdam (2003)Google Scholar
  30. 30.
    Smith, I., Consolvo, S., Hightower, J., Hughes, J., Iachello, G., LaMarca, A., Abowd, G.D., Scott, J., Sohn, T.: Social Disclosure Of Place: From Location Technology to Communication Practice. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol. 3468, pp. 134–151. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  31. 31.
    Weilenmann, A.: I Can’t Talk Now: I’m In A Fitting Room. In: Weilenmann, A. (ed.) Formulating Availability And Location In Mobile Phone Conversations, Environment and Planning A 35, Pion, pp. 1589–1605 (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Giovanni Iachello
    • 1
  • Ian Smith
    • 2
  • Sunny Consolvo
    • 2
  • Gregory D. Abowd
    • 1
  • Jeff Hughes
    • 3
  • James Howard
    • 3
  • Fred Potter
    • 3
  • James Scott
    • 4
  • Timothy Sohn
    • 5
  • Jeffrey Hightower
    • 2
  • Anthony LaMarca
    • 2
  1. 1.College of Computing and GVU CenterGeorgia Institute of TechnologyAtlantaUSA
  2. 2.Intel ResearchSeattleUSA
  3. 3.Department of Computer Science and EngineeringUniversity of WashingtonSeattleUSA
  4. 4.Intel ResearchCambridgeUK
  5. 5.Computer Science and EngineeringUniversity of CaliforniaSan Diego, La JollaUSA

Personalised recommendations