[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/2042053.2042093guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Improving users' consistency when recalling location sharing preferences

Published: 05 September 2011 Publication History

Abstract

This paper presents a study of the effect of one instance of contextual cues, trajectory reminders, on the recollection of location sharing preferences elicited using a retrospective protocol. Trajectory reminders are user interface elements that indicate for a particular location of a person's trail across a city the locations visited before and after. The results of the study show that reminding users where they have been before and after a specific visited location can elicit more consistent responses in terms of stated location sharing preferences for that location visit. This paper argues that trajectory reminders are useful when collecting preference data with retrospective protocols because they can improve the quality of the collected data.

References

[1]
Barkhuus, L.: Privacy in location-based services, concern vs. coolness. In: Mobile HCI 2004 Workshop: Location System Privacy and Control (2004).
[2]
Benisch, M., Kelley, P.G., Sadeh, N., Cranor, L.F.: Capturing location-privacy preferences: Quantifying accuracy and user-burden tradeoffs. Personal and Ubiquitous Computing, 1-16 (2010).
[3]
Eagle, N., Pentland, A.S., Lazer, D.: Inferring friendship network structure by using mobile phone data. Proceedings of the National Academy of Sciences 106((36), 15724- 15728 (2009).
[4]
Hektner, J.M., Schmidt, J.A., Csikszentmihalyi, M.: Experience Sampling Method: Measuring the Quality of Everyday Life. Sage Publications, Thousand Oaks (2007).
[5]
Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: MobiSys 2004, pp. 177-189 (2004).
[6]
Kahneman, D., Krueger, A.B., Schkade, D.A., Schwarz, N., Stone, A.A.: A Survey Method for Characterizing Daily Life Experience: The Day Reconstruction Method. Science 306(5702), 1776-1780 (2004).
[7]
Kelley, P.G., Hankes Drielsma, P., Sadeh, N., Cranor, L.F.: User-controllable learning of security and privacy policies. In: AISec 2008, pp. 11-18 (2008).
[8]
Khalil, A., Connelly, K.: Context-aware telephony: privacy preferences and sharing patterns. In: CSCW 2006, pp. 469-478 (2006).
[9]
Robinson, M.D., Clore, G.L.: Belief and feeling: Evidence for an accessibility model of emotional self-report. Psychological Bulletin 128(6), 934-960 (2002).
[10]
Schwarz, N., Kahneman, D., Xu, J., Belli, R., Stafford, F., Alwin, D., et al.: Global and episodic reports of hedonic experience. Calendar and Time Diary Methods in Life Course Research: Methods in Life Course Research, p. 157. Sage Pubns., Thousand Oaks (2008).
[11]
Tsai, J.Y., Kelley, P., Drielsma, P., Cranor, L.F., Hong, J., Sadeh, N.: Who's viewed you?: the impact of feedback in a mobile location sharing application. In: CHI 2009, pp. 2003- 2012 (2009).
[12]
Wagner, D., Lopez, M., Doria, A., Pavlyshak, I., Kostakos, V., Oakley, I., Spiliotopoulos, T.: Hide And Seek: Location Sharing Practices With Social Media. In: MobileHCI 2010, pp. 55-58.
[13]
Tulving, E.: Episodic Memory: From Mind to Brain. Annual Review of Psychology 53(1), 1-25 (2002).
[14]
Karapanos, E., Martens, J.-B., Hassenzahl, M.: Reconstructing Experiences through Sketching. Arxiv preprint, arXiv:0912.5343 (2009).
[15]
Hsieh, G., Li, I., Dey, A., Forlizzi, J., Hudson, S.E.: Using visualizations to increase compliance in experience sampling. In: Proceedings of the 10th International Conference on Ubiquitous Computing (2008).

Cited By

View all
  • (2015)How do we engage with activity trackers?Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing10.1145/2750858.2804290(1305-1316)Online publication date: 7-Sep-2015
  • (2015)Privacy Tipping Points in Smartphones Privacy PreferencesProceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems10.1145/2702123.2702404(807-816)Online publication date: 18-Apr-2015
  • (2013)Footprint trackerProceedings of the SIGCHI Conference on Human Factors in Computing Systems10.1145/2470654.2481405(2921-2930)Online publication date: 27-Apr-2013

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
INTERACT'11: Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part I
September 2011
660 pages
ISBN:9783642237737

Sponsors

  • Fundacao para a Ciencia e Tecnologia
  • YDreams
  • AbERTA: AbERTA
  • Microsoft Research: Microsoft Research
  • INSEC-ID: inesc id lisboa

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 05 September 2011

Author Tags

  1. consistency
  2. location sharing preferences
  3. retrospective protocols

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2015)How do we engage with activity trackers?Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing10.1145/2750858.2804290(1305-1316)Online publication date: 7-Sep-2015
  • (2015)Privacy Tipping Points in Smartphones Privacy PreferencesProceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems10.1145/2702123.2702404(807-816)Online publication date: 18-Apr-2015
  • (2013)Footprint trackerProceedings of the SIGCHI Conference on Human Factors in Computing Systems10.1145/2470654.2481405(2921-2930)Online publication date: 27-Apr-2013

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media