Who’s Viewed You? The Impact of Feedback in a Mobile Location-Sharing Application Date : 2011/09/06 Reporter : Lin Kelly.

Slides:



Advertisements
Similar presentations
Designing for Context: Usability in a Ubiquitous Environment Jenna Burrell, Paul Treadwell, Geri K. Gay Human Computer Interaction Group Cornell University.
Advertisements

Training to care for people with dementia Dementia Training Partner logo here Training support Skills development Competency Assessment Scholarships Education.
Bonnygate Primary School
The Bold, New Extreme Programming Experiment - Now in Its Ninth Year Brian Spears Follett Software Company McHenry, IL 2009 Agile Conference Student: Nick.
What is the ADDIE Model? By San Juanita Alanis. The ADDIE model is a systematic instructional design model consisting of five phases: –Analysis –Design.
Facebook Presented by: Keystone Computer Concepts.
Consumers & Online Privacy: Agenda Background and objectives General attitudes to the internet Attitudes to online data and privacy Attitudes to.
Graphical Results Results The Effect of Virtual Worlds on Adolescents' Real World Lives Using an upper-division undergraduate social science course, students.
A Case Study of Student’s Attitude Towards the Adoption of Educational Apps and Mobilization as Teaching and Learning Tools at a Historical Black College.
A Web-Based Tool for Collecting Faculty “Non- Classroom” Productivity Data Richard D. Howard James B. Rimpau
Privacy and Ubiquitous Computing Jason I. Hong. Ubicomp Privacy is a Serious Concern “[Active Badge] could tell when you were in the bathroom, when you.
360-degree feedback Briefing for Participants Full Circle Feedback
Attitudes of online panel members to mobile application based research 1 Robert Pinter WebDataNet Conference 2015 University of Salamanca
School Psychological Services in High Schools: Responding to Teachers’ Needs Presented by Kari Sears, Ed.S., NCSP, Patricia Warner, Ph.D., NCSP, Tammy.
HL2 MARKETING THEORY: QUANTITATIVE MARKET RESEARCH IB BUSINESS & MANAGEMENT A COURSE COMPANION.
Geographic Routing of Toll Free Services Future of Numbering Working Group Presented by: David Greenhaus, 800 Response Information Services 1.
ELECTRONIC DATA COLLECTION SYSTEM Howard Hamilton.
LINC 2007 M-Learning from a Cell Phone: Improving Students’ EMP Learning Experience through Interactive SMS Platform By: Jafar Asgari Arani
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
Electronic EDI e-EDI. The EDI has been in use since 1999 using a paper-based system and computerized spreadsheets to collect and manage EDI data. Over.
North West Disability Infrastructure Partnership - Mapping Report Merseyside Disability Federation Charity No:
LOG O Development of a diagnostic system using a testing-based approach for strengthening student prior knowledge Computers & Education (September 2011)
Putting Your Heads Together How To Form and Effectively Run a Study Group.
The role of self-handicapping in social networks Bridgett J. Milner Edward R. Hirt Thanks to: Kristin Hendrix & Erin Steury.
1 University students’ use of and attitudes towards online listening for self-study purposes Kristen Sullivan Shimonoseki City University
Choompol Thongchuenjitt Inferring Friendship over Mobile Phone Data.
Making Sense of the Social World 4th Edition
Note to evaluator… The overall purpose of this presentation is to guide evaluators through the completion of step 7 of the UFE checklist and to “level.
Our Twitter Profiles, Our Selves: Predicting Personality with Twitter Daniele Quercia, Michal Kosinski, David Stillwell, Jon Crowcroft COMP4332 Wong Po.
Waseda Univ Nakajima Lab Interaction Group Computer-supported knowledge sharing in co-located environments Yasufumi Hirakawa, Harumi Mase, Eiji Tokunaga.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
” Interface” Validity Investigating the potential role of face validity in content validation Gábor Szabó, Robert Märcz ECL Examinations EALTA 9 - Innsbruck,
Safe Use of Social Media Cadets – Air Force’s Future.
Human Computer Interaction
Chapter 12 Building Effective Relationships. Leader Effectiveness and Adaptability Description (LEAD) measures three areas of leader behavior: Style 
 What Is the Universal Login Interface?  Who Is Affected?  How Does It Work? 2.
Classroom Assessment A Practical Guide for Educators by Craig A. Mertler Chapter 13 Assessing Affective Characteristics.
CyLab Usable Privacy and Security Laboratory 1 C yLab U sable P rivacy and S ecurity Laboratory Location-sharing.
Longitude Usability Study Final Presentation Amir Malik Fiel Guhit Viet Pham Sabel Braganza.
Adaptive Information-Sharing for Privacy-Aware Mobile Social Network Igor Bilogrevic 1, Kévin Huguenin 1, Berker Agir 1, Murtuza Jadliwala 2 and Jean-Pierre.
User Interfaces 4 BTECH: IT WIKI PAGE:
Chapter 3: Software Project Management Metrics
I can be You: Questioning the use of Keystroke Dynamics as Biometrics —Paper by Tey Chee Meng, Payas Gupta, Debin Gao Presented by: Kai Li Department of.
JS Mrunalini Lecturer RAKMHSU Data Collection Considerations: Validity, Reliability, Generalizability, and Ethics.
Employing Wikis for online collaboration in the e-learning environment: Case study 1 Raitman, R., Augar, N. & Zhou, W. (2005). Employing Wikis for online.
Digital Libraries1 David Rashty. Digital Libraries2 “A library is an arsenal of liberty” Anonymous.
Dmitri Denisov, D0 Collaboration, ICHEP041 D0 Collaboration Authorship Rules As of Summer 2004 D0 Collaboration author list consists of 577 people in 74.
By Bernard Ikoli.  Introduction  What is Internet?  Impact of the Internet in the society  What is Ethic ?  Applying Ethic to the internet  Conclusion.
Online students’ perceived self-efficacy: Does it change? Presenter: Jenny Tseng Professor: Ming-Puu Chen Date: July 11, 2007 C. Y. Lee & E. L. Witta (2001).
1 Technical Communication A Reader-Centred Approach First Canadian Edition Paul V. Anderson Kerry Surman
Safe and active life as pupils’ experience Survey study for 5th and 7th grade students in Turku.
USING GIS TO SUPPORT PROCESS BASED GEOGRAPHY EDUCATION IN TURKEY: A CASE STUDY Eyüp Artvinli Eskişehir Osmangazi University Faculty of Education TURKEY.
User Interface Evaluation Introduction Lecture #15.
“How do I keep my child safe online?” Miss Johnstone Computing Co-ordinator “Parents / Carers are the one important factor in the home environment to keep.
By Ambreen Anis Nagori Course Facilitator Dr.Iffet Sultana M.Ed First Semester (Inclusive Education) Iqra University.
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
Computing Honours Project (COMP10034) Lecture 4 Primary Research.
Component D: Activity D.3: Surveys Department EU Twinning Project.
MANAGEMENT INFORMATION SYSTEM
PROBIOTICS FOR BELONGING
Measuring Attitudes A person’s attitude towards an attitude object may be measured in two ways. Obseravtion of behavioural signals Highly positive or.
Selecting the Best Measure for Your Study
FEASIBILITY STUDY Feasibility study is a means to check whether the proposed system is correct or not. The results of this study arte used to make decision.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
The Use of Facets in Web Search Engines
Usability Testing: An Overview
Systems Analysis and Design
Incremental Waterfall
Personal profiles in VLE forums: do students use them?
Internet Safety – Social Media
Presentation transcript:

Who’s Viewed You? The Impact of Feedback in a Mobile Location-Sharing Application Date : 2011/09/06 Reporter : Lin Kelly

Abstract This paper major contribution has been to show that feedback is an important contributing factor towards improving user comfort levels and allaying privacy concerns. – Locyoution : a mobile location sharing system in this paper.

Introduction Commercially available providers of mobile phone-based location sharing services, it allow users to view friends’ locations but do not provide information about who has been querying users’ locations. We investigate in this paper is “how important is feedback for managing personal privacy in a ubiquitous computing system?”

In this study – One experimental group was given feedback in the form of a history of requests for their locations. – The second group was given no feedback at all. This Paper sought to understand how system feedback affects users’ privacy concerns, the way they specify their disclosure rules, and their willingness to use the system.

Social Translucency and Feedback With these new web interfaces, users can audit the actions the system has taken on their behalf and monitor how people use the system. Users were willing and able to provide considerable amounts of auditing feedback to systems that show improvement in their reasoning, based on each user’s responses.

Studies of Privacy in Location-Based Applications Concepts of privacy often adapt to changing social norms that surround the use of new technology, so attitudes about location information may shift over time. While users are willing to share their locations when presented with a request for that information, past work strongly suggests that users have concerns over who is trying to find them and the context in which that person is requesting a location.

This study deploys a mobile location application in an OSN(online social networks) environment where queries are not limited to a small number of pre-set contacts, buddies, or social relations. Instead, any Facebook user who can access our participant’s Facebook profile may have the ability to view a participant’s location, restricted by time-based rules. In addition to time-based rules, users also indicated that they are likely to use location- based and group-based rules.

LOCYOUTION Locyoution is our Facebook interface for a mobile locationsharing application built on PeopleFinder technology. It consists of two main pieces of technology: – software that users install on their laptops and an application that is added on Facebook. – By using Facebook, we leverage a social network of which participants are already a part.

Locyoution benefits from iterative improvements to the PeopleFinder system based on feedback collected from several other pilots of the technology over the previous two years. When people wish to check a Locyoution user’s location, they must go to that user’s Facebook profile and click on the icon for the Locyoution application.

Facebook Privacy Settings Facebook itself also provides a comprehensive set of controls for users to protect their privacy.

LOCYOUTION STUDY Participants, solicited from a university population, were asked to install and use Locyoution over a period of four weeks. – In Phase 1, participants completed a questionnaire and study consent forms. – In Phase 2, participants were provided with a Locyoution username and password, and installation tutorials.

– In Phase 3, participants were asked to use Locyoution. – In Phase 4, participants completed an exit survey on their experience with Locyoution. To determine the impact of feedback on the privacy attitudes and adoption of our mobile location application, participants were divided into two conditions: – No Feedback condition – Feedback condition

Method These results are based on a Likert scale from 1 - 7, ranging from not comfortable at all to fully comfortable.

Simmary People have privacy concerns about sharing their location, but experience with the system slightly reduced their privacy concerns. People who had received feedback become more comfortable with sharing their location information with friends and strangers. Users in the Feedback condition had a lesser degree of concern for their privacy after using the technology.

In general, people want to know who has been viewing them. But, for those who did not receive feedback, more people were unwilling or unsure if they would be more willing to share their locations with others. The desire to know who has been viewing one’s profile is compelling enough that participants would be willing to trade in an opaque system to have it

RULE EXPRESSIVENESS

Users in the study seem to feel comfortable enough with the level of control they were given to actually use the system, while at the same time indicating that they wished they had access to more expressive rules. Participants were relatively happy with time- based rules, but feel that they would be likely to use location-based rules and group-based rules. Users of mobile location sharing systems may make their locations viewable for a greater number of hours (if using time-based rules) if they can see who has been checking their locations.

TECHNOLOGY ADOPTION Peers have a significant impact on whether or not a user will accept and continue to use a mobile location-sharing technology. The more technically savvy someone is has an impact on whether or not a user will continue to use a mobile location sharing technology.

CONCLUSION Providing feedback to users about when and by whom they have been queried tends to make them more comfortable about sharing location information. Feedback is a wanted feature in such a system and makes users more willing to share their location information.

Users are able to use time-based rules to control access to their location information, and they feel that these rules accurately represent their privacy preferences. Users who have feedback are more likely to set rules that make themselves findable for a greater number of hours. Peers and technical savviness have a significant impact on whether or not a user will accept and continue to use a location technology.