578
Views
7
CrossRef citations to date
0
Altmetric
Articles

Privacy in location-based social networks: privacy scripts & user practices

, &
Pages 1-15 | Received 01 Apr 2014, Accepted 05 Feb 2015, Published online: 13 Mar 2015

References

  • Acquisti, A., and J. Grossklags. 2005. “Privacy and Rationality in Individual Decision Making.” Security & Privacy, IEEE 3 (1): 26–33. doi:10.1109/MSP.2005.22.
  • Akrich, Madeleine. 1992. “The Description of Technical Objects.” In Shaping Technology/Building Society: Studies in Sociotechnical Change, edited by W. Bijker and J. Law, 205–223. Cambridge, MA: MIT Press.
  • Ardagna, Claudio A., Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, and Pierangela Samarati. 2008. “Privacy-Enhanced Location Services Information.” In Digital Privacy. Theory, Technologies, and Practices, edited by Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, and Sabrina De Capitani di Vimercati, 307–326. Boca Raton, FL: Auerbach (Taylor & Francis group).
  • Barkhuus, Louise. 2012. “The Mismeasurement of Privacy: Using Contextual Integrity to Reconsider Privacy in HCI.” In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 367–376. New York: ACM. http://cseweb.ucsd.edu/,barkhuus/barkhuus-privacy2012.pdf.
  • Barkhuus, Louise, and Anind Dey. 2003. “Location-Based Services for Mobile Telephony: A Study of Users' Privacy Concerns.” In Proceedings of Interact, 709–712. Amsterdam: IOS Press.
  • Benisch, M., P. G. Kelley, N. Sadeh, and L. F. Cranor. 2011. “Capturing Location-Privacy Preferences: Quantifying Accuracy and User-Burden Tradeoffs.” Personal and Ubiquitous Computing 15 (7): 679–694. doi:10.1007/s00779-010-0346-0.
  • Bijker, W., and J. Law. 1992. Shaping Technology/Building Society: Studies in Socio-Technical Change. Cambridge, MA: MIT Press.
  • Boyd, D., and A. Marwick. 2011. “Social Privacy in Networked Publics: Teens' Attitudes, Practices, and Strategies.” Paper presented at A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society, Oxford.
  • Brandimarte, L., Alessandro Acquisti, and G. Loewenstein. 2012. “Misplaced Confidences: Privacy and the Control Paradox.” Social Psychological and Personality Science. doi:10.1177/1948550612455931.
  • Brandimarte, L., A. Acquisti, G. Loewenstein, and L. Babcock. 2009. “Privacy Concerns and Information Disclosure: An Illusion of Control Hypothesis.” Poster presented at iConference, Chapel Hill.
  • Danezis, G., and S. Gürses. 2010. “A Critical Review of 10 Years of Privacy Technology.” The Proceedings of Surveillance Cultures: A Global Surveillance Society. http://homes.esat.kuleuven.be/∼sguerses/papers/DanezisGuersesSurveillancePets2010.pdf.
  • Deuze, Marc. 2012. Media Life. Cambridge, MA: Polity Press.
  • Dourish, Paul. 2004. “What We Talk About When We Talk about Context.” Personal Ubiquitous Computing 8 (1): 19–30. https://doi.org/doi:10.1007/s00779-003-0253-8.
  • Gillespie, T., P. J. Boczkowski, and K. A. Foot, eds. 2013. Media Technologies: Essays on Communication, Materiality, and Society. Inside Technology. Cambridge, MA: MIT Press.
  • Ihde, D. 1990. Technology and the Lifeworld. From Garden to Earth. Bloomington: Indiana University Press.
  • Ihde, D. 2006. “Forty Years in the Wilderness.” In Postphenomenology: A Critical Companion to Ihde, SUNY Series in the Philosophy of the Social Sciences, edited by E. Selinger. Albany, NY: SUNY Press.
  • Kelley, P. G., M. Benisch, L. F. Cranor, and N. Sadeh. 2011. “When Are Users Comfortable Sharing Locations with Advertisers?” In proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2449–2452. New York: ACM.
  • Kölsch, T., L. Fritsch, M. Kohlweiss, and D. Kesdogan. 2005. “Privacy for Profitable Location Based Services.” In Security in Pervasive Computing, edited by D. Hutter and M. Ullmann, 164–178. Heidelberg: Springer.
  • Lee, T. 2005. “The Impact of Perceptions of Interactivity on Customer Trust and Transaction Intentions in Mobile Commerce.” Journal of Electronic Commerce Research 6 (3): 165–180.
  • Lin, Jialiu, Guang Xiang, Jason I. Hong, and Norman Sadeh. 2010. “Modeling People's Place Naming Preferences in Location Sharing.” In Proceedings of the 12th ACM International Conference on Ubiquitous Computing, 75–84. New York: ACM. http://dl.acm.org/citation.cfm?id = 1864362.
  • Palen, Leysia, and Paul Dourish. 2003. “Unpacking Privacy for a Networked World.” In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 129–136. New York: ACM. http://dl.acm.org/citation.cfm?id = 642635.
  • Strauss, A., and J. Corbin. 1990. Basics of Qualitative Research. Grounded Theory Procedures and Techniques. Newbury Park, CA: Sage.
  • Stutzman, Fred, Robert Capra, and Jamila Thompson. 2011. “Factors Mediating Disclosure in Social Network Sites.” Computers in Human Behavior 27 (1): 590–598. doi:10.1016/j.chb.2010.10.017.
  • Tang, Karen P., Jialiu Lin, Jason I. Hong, Daniel P. Siewiorek, and Norman Sadeh. 2010. “Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. Purpose-Driven Location Sharing.” In Proceedings of the 12th ACM International Conference on Ubiquitous Computing, 85–94. New York: ACM.
  • Toch, E., J. Cranshaw, P. H. Drielsma, J. Y. Tsai, P. G. Kelley, J. Springfield, L. Cranor, J. Hong, and N. Sadeh. 2010. “Empirical Models of Privacy in Location Sharing.” In Proceedings of the 12th ACM International Conference on Ubiquitous Computing, 129–138. New York: ACM. http://dl.acm.org/ft_gateway.cfm?id = 1864364&type = pdf.
  • Veeckman, Carina, Laurence Claeys, Paulien Coppens, Karel Verbrugge, and Isabelle Stevens. 2014. “Mobile Users Concerns for Information Privacy in Location Based Services.” Paper presented at the ICA Mobile preconference, Seattle.
  • Xu, H. 2007. “The Effects of Self-Construal and Perceived Control on Privacy Concerns.” In Proceedings of the 28th Annual International Conference on Information Systems (ICIS 2007), paper 125. http://citeseerx.ist.psu.edu/viewdoc/download?doi = 10.1.1.231.4243&rep = rep1&type = pdf.
  • Xu, H., Hock-Hai Teo, Bernard C. Y. Tan, and R. Agarwal. 2009. “The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services.” Journal of Management Information Systems 26 (3): 135–174. doi:10.2753/MIS0742-1222260305.
  • Zheng, Yu. 2011. “Location-Based Social Networks: Users.” In Computing with Spatial Trajectories, edited by Yu Zheng and X. Zhou. New York: Springer.
  • Zhou, Tao. 2011. “The Impact of Privacy Concern on User Adoption of Location-Based Services.” Industrial Management & Data Systems 111 (2): 212–226. doi:10.1108/02635571111115146.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.