225
Views
2
CrossRef citations to date
0
Altmetric
Articles

Investigating the Willingness of Sharing Real-Time Daily Activities among Friends

ORCID Icon, ORCID Icon, &

References

  • Anderson, I., Maitland, J., Sherwood, S., Barkhuus, L., Chalmer, M., Hall, M., … Muller, H. (2007). Shakra: Tracking and sharing daily activity levels with unaugmented mobile phones. Mobile Networks and Applications, 12(2–3), 185–199. doi:10.1007/s11036-007-0011-7
  • Bentley, F., & Metcalf, C. (2007). Sharing motion information with close family and friends. In Proceedings of the ACM conference on human factors in computing systems (pp. 1361–1370). San Jose, CA. doi:10.1016/j.chemosphere.2006.10.046
  • Berg, S., Taylor, A. S., & Harper, R. (2003). Mobile phones for the next generation: Device designs for teenagers. In Proceedings of the ACM conference on human factors in computing systems (pp. 433–440). Fort Lauderdale, FL.
  • Bogdan, C., & Sundblad, O. (1999). A cue-based, integrated system for supporting social awareness. Technical Report TRITA-NA-D9904, CID.
  • Caldwell, M. A., & Peplau, L. A. (1982). Sex differences in same-sex friendship. Sex Roles, 8(7), 721–732. doi:10.1007/BF00287568
  • Chen, Y., Chen, Y., Randriambelonoro, M., Geissbuhler, A., & Pu, P. (2017). Design considerations for social fitness applications: Comparing chronically Ill patients and healthy adults. In Proceedings of the ACM conference on computer supported cooperative work and social computing (pp. 1753–1762). Portland, OR.
  • Chen, Y., & Pu, P. (2014). HealthyTogether: Exploring social incentives for mobile fitness applications. In Proceedings of the international symposium of Chinese CHI (pp. 25–34). Toronto, ON. doi:10.1089/g4h.2013.0066
  • Consolvo, S., Smith, I. E., Matthews, T., LaMarca, A., Tabert, J., & Powledge, P. (2005). Location disclosure to social relations: Why, when, & what people want to share. In Proceedings of the ACM conference on human factors in computing systems (pp. 81–90). Portland, OR.
  • Csikszentmihalyi, M., Larson, R., & Prescott, S. (1977). The ecology of adolescent activity and experience. Journal of Youth and Adolescence, 6(3), 281–294. doi:10.1007/BF02138940
  • Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59(2), 323–342. doi:10.1111/1540-4560.00067
  • Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61–80. doi:10.1287/isre.1060.0080
  • Dong, M., Chen, L., & Wang, L. (2019). Investigating the user behaviors of sharing health-and fitness-related information generated by Mi band on Weibo. International Journal of Human–Computer Interaction, 35(9), 773–786. doi:10.1080/10447318.2018.1496968
  • Epstein, D. A., Jacobson, B. H., Bales, E., McDonald, D. W., & Munson, S. A. (2015). From nobody cares to way to go!: A design framework for social sharing in personal informatics. In Proceedings of the ACM conference on computer supported cooperative work & social computing (pp. 1622–1636). Vancouver, BC.
  • Formann, A. K. (1984). Die latent-class-analyse: Einführung in Theorie und Anwendung. Beltz. Weinheim, Germany: Beltz-Verlag.
  • Guo, H., Chen, L., Chen, G., & Lv, M. (2015). An interpretable orientation and placement invariant approach for smartphone based activity recognition. In Proceedings of IEEE international conference on ubiquitous intelligence & computing (pp. 143–150). Beijing, China.
  • Guo, H., Chen, L., Chen, G., & Lv, M. (2016). Smartphone-based activity recognition independent of device orientation and placement. International Journal of Communication Systems, 29(16), 2403–2415. doi:10.1002/dac.v29.16
  • Guo, H., Chen, L., Peng, L., & Chen, G. (2016). Wearable sensor based multimodal human activity recognition exploiting the diversity of classifier ensemble. In Proceedings of the ACM international joint conference on pervasive and ubiquitous computing (pp. 1112–1123). Heidelberg, Germany.
  • Hassib, M., Buschek, D., Wozniak, P., & Alt, F. (2017). HeartChat: Heart rate augmented mobile chat to support empathy and awareness. In Proceedings of the ACM conference on human factors in computing systems (pp. 2239–2251). Denver, CO.
  • Hays, R. B. (1984). The development and maintenance of friendship. Journal of Social and Personal Relationships, 1(1), 75–98. doi:10.1177/0265407584011005
  • Khalil, A., & Connelly, K. (2006). Context-aware telephony: Privacy preferences and sharing patterns. In Proceedings of the ACM conference on computer supported cooperative work (pp. 469–478). Montréal, QC.
  • Kim, S., Kientz, J., Patel, S., & Abowd, G. (2008). Are you sleeping?: Sharing portrayed sleeping status within a social network. In Proceedings of the ACM conference on computer supported cooperative work (pp. 619–628). San Diego, CA.
  • Kostakos, V., Venkatanathan, J., Reynolds, B., Sadeh, N., Toch, E., Shaikh, S. A., & Jones, S. (2011). Who’s your best friend?: Targeted privacy attacks In location-sharing social networks. In Proceedings of the international conference on ubiquitous computing (pp. 177–186). doi:10.1177/1753193411427832
  • Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: Why we disclose. Journal of Information Technology, 25(2), 109–125. doi:10.1057/jit.2010.6
  • Kumaraguru, P., & Cranor, L. F. (2005). Privacy indexes: A survey of Westin’s studies. Pittsburgh, PA: Carnegie Mellon University, School of Computer Science, Institute for Software Research International.
  • Larson, R., & Csikszentmihalyi, M. (1983). The experience sampling method. New Directions for Methodology of Social & Behavioral Science, 15, 41–56.
  • Lv, M., Chen, L., Chen, T., & Chen, G. (2018). Bi-view semi-supervised learning based semantic human activity recognition using accelerometers. IEEE Transactions on Mobile Computing, 17(9), 1991–2001. doi:10.1109/TMC.2018.2793913
  • Metaxas, G., Metin, B., Schneider, J., Markopoulos, P., & Ruyter, B. (2009). Awareness of daily life activities. In Awareness systems (pp. 351–365). London: Springer-Verlag.
  • Miluzzo, E., Lane, N., Eisenman, S., & Campbell, A. (2007). CenceMe – Injecting sensing presence into social networking applications. In Proceedings of the European conference on smart sensing and context (pp. 1–28). Kendal, UK.
  • Newman, M. W., Lauterbach, D., Munson, S. A., Resnick, P., & Morris, M. E. (2011). “It’s not that I don’t have problems, I’ m just not putting them on facebook”: Challenges and opportunities in using online social networks for health. In Proceedings of the ACM conference on computer supported cooperative work (pp. 341–350). Hangzhou, China.
  • Oulasvirta, A., Petit, R., Raento, M., & Tiitta, S. (2007). Interpreting and acting on mobile awareness cues. Human-Computer Interaction, 22(1), 97–135.
  • Oulasvirta, A., Raento, M., & Tiitta, S. (2005). ContextContacts: Re-designing smartphone’s contact book to support mobile awareness and collaboration. In Proceedings of the international conference on human computer interaction with mobile devices and services (pp. 167–174). doi:10.1016/j.alcohol.2006.03.004
  • Patil, S., Schlegel, R., Kapadia, A., & Lee, A. (2014). Reflection or action?: How feedback and control affect location sharing decisions. In Proceedings of the ACM conference on human factors in computing systems (pp. 101–110). doi:10.1177/1753193413478349
  • Peng, L., Chen, L., Wu, M., & Chen, G. (2018). Complex activity recognition using acceleration, vital sign, and location data. IEEE Transactions on Mobile Computing, 18(7), 1488–1498.
  • Peng, L., Chen, L., Wu, X., Guo, H., & Chen, G. (2017). Hierarchical complex activity representation and recognition using topic model and classifier level fusion. IEEE Transactions on Biomedical Engineering, 64(6), 1369–1379. doi:10.1109/TBME.2016.2604856
  • Peng, L., Chen, L., Ye, Z., & Zhang, Y. (2018). AROMA: A deep multi-task learning based simple and complex human activity recognition method using wearable sensors. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2(2), Article 74. doi:10.1145/3214277
  • Raij, A., Ghosh, A., Kumar, S., & Srivastava, M. (2011). Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment. In Proceedings of the ACM conference on human factors in computing systems (pp. 11–20). doi:10.1016/j.alcohol.2010.08.018
  • Shih, F., & Boortz, J. (2013). Understanding people’s preferences for disclosing contextual information to smartphone apps. In Proceedings of the international conference on human aspects of information security, privacy, and trust (pp. 186–196). Las Vegas, NV.
  • Teodoro, R., & Naaman, M. (2013). Fitter with Twitter: Understanding personal health and fitness activity in social media. In International Conference on Weblogs and Social Media (pp. 611–620). Boston, MA.
  • Wiese, J., Kelley, P. G., Cranor, L. F., Dabbish, L., Hong, J. I., & Zimmerman, J. (2011). Are you close with me? Are you nearby?: Investigating social groups, closeness, and willingness to share. In Proceedings of the ACM international conference on ubiquitous computing (pp. 197–206). Beijing, China.
  • Xie, J., Knijnenburg, B. P., & Jin, H. (2014). Location sharing privacy preference: Analysis and personalized recommendation. In Proceedings of the ACM international conference on Intelligent User Interfaces (pp. 189–198). Haifa, Israel.
  • Yuan, N. J., Zhong, Y., Zhang, F., Xie, X., Lin, C. Y., & Rui, Y. (2016). Who will reply to/retweet this tweet?: The dynamics of intimacy from online social interactions. In Proceedings of the ACM international conference on web search and data mining (pp. 3–12). San Francisco, CA.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.