SlideShare a Scribd company logo
1 of 5
Download to read offline
Copyright 2002, Intel Corporation, All rights reserved.
Location-Based Services for Mobile Telephony: a Study of Users’
Privacy Concerns
Louise Barkuus, and Anind Dey
IRB-TR-03-024
July, 2003
Proceedings of the INTERACT 2003, 9TH
IFIP TC13 International Conference on
Human-Computer Interaction
DISCLAIMER: THIS DOCUMENT IS PROVIDED TO YOU "AS IS" WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY
WARRANTY OF MERCHANTABILITY NON-INFRINGEMENT, OR FITNESS FOR ANY PARTICULAR PURPOSE. INTEL AND
THE AUTHORS OF THIS DOCUMENT DISCLAIM ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY
PROPRIETARY RIGHTS, RELATING TO USE OR IMPLEMENTATION OF INFORMATION IN THIS DOCUMENT. THE
PROVISION OF THIS DOCUMENT TO YOU DOES NOT PROVIDE YOU WITH ANY LICENSE, EXPRESS OR IMPLIED, BY
ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS
Location-Based Services for Mobile Telephony: a study of
users’ privacy concerns
Louise Barkhuus & Anind Dey
The IT University of Copenhagen
Glentevej 67, 2400
Copenhagen, Denmark
barkhuus@itu.dk
Intel Research, Berkeley
2150 Shattuck Avenue, Suite 1300
Berkeley, CA, USA
anind@intel-research.net
Abstract: Context-aware computing often involves tracking peoples’ location. Many studies and applications
highlight the importance of keeping people’s location information private. We discuss two types of location-
based services; location-tracking services that are based on other parties tracking the user’s location and
position-aware services that rely on the device’s knowledge of its own location. We present an experimental case
study that examines people’s concern for location privacy and compare this to the use of location-based services.
We find that even though the perceived usefulness of the two different types of services is the same, location-
tracking services generate more concern for privacy than posit ion-aware services. We conclude that development
emphasis should be given to position-aware services but that location-tracking services have a potential for
success if users are given a simple option for turning the location-tracking off.
Keywords: Location-based services, context -aware computing, mobile telephony, human-computer interaction
1 Introduction
Context-aware computing describes applications,
often implemented for mobile devices that adapt to
environmental sensor information. Many of these
applications rely solely on location information as
their context and although some researchers claim
that too much attention is given to this type of
sensor information (Schmidt et al., 1999), it is
predicted that location-based services will be the
most common form of context -aware computing
(Ljungstrand, 2001). As mobile telephony becomes
increasingly common as a handheld computing
platform, location-tracking of mobile phones enables
location-based services to spread outside closed
environments. Location-tracking of customers by
mobile telephony providers via GSM and later GPS-
enabled services generates a need for addressing
privacy issues in relation to the building of location-
based technologies and services. We distinguish
between two types of location-based services:
location-tracking and position-aware (Snekkenes,
2001). Location-tracking services are services relying
on the tracking of peoples’ location by other parties
such as mobile telephony service providers, whereas
position-aware services are bas ed on the device’s
own knowledge of its position. Examples of the two
services include locating friends or family members
and updating the time when entering a new time
zone, respectively. By studying peoples’ concern for
and use of location-based services , it is our goal to
provide insight about the degree to which location-
based services are considered to be intrusive on
users’ privacy and whether location-tracking or
position-aware services generate more concern.
We present a case study that examines peoples’
concern for location privacy in relation to location-
based services. We presented each study participant
with four hypothetical location-based features (two
location-tracking and two position-aware services)
for their mobile phone, and studied their preferences
and concerns as well as their expected use of the
services. By comparing the findings, we found that
people are positive towards the location-based
services as long as they perceive them to be useful.
We also found that location-tracking services
generate more concern than position-based ones.
We first present related work in the area of
privacy and location-tracking. Second we present our
study and its design and third, we present the results
of the study. Finally we discuss these results and
conclude that development emphasis should be
given to position-aware services and that location-
tracking features should be implemented giving the
user control over who can track their location. Finally
we give suggestions for further research.
2 Related Work
Research within location-tracking in indoor
environments has been conducted for over a decade.
Early work such as the Active Location Badge
system (Want et al., 1992) uses infra-red technology
but other sensor technologies have been explored as
well (Hazas and Ward, 2002). Because we propose
location-based services limited to mobile phones,
however, the related work falls in the category of
outdoor location-tracking using GSM and GPS
technologies. This approach generates a different set
of privacy issues, since it is likely that people have
different concerns about being tracked by, for
example, their service provider than their employer.
2.1 Location-Based Services
The research focusing on location-based services is
vast and a number of these services have been
implemented and tested; for example the Guide
project (Cheverst et al., 2000) and Cyber Guide
(Abowd et al., 1997). Most of these applications use
the position-aware approach, meaning that an
application’s actions are based on its knowledge of
its own position. Location-tracking services, such as
safety-based ones, for children or the elderly, have
been developed (Marmasse and Schmandt, 2003).
Applications outside the research lab include ‘friend
finder’ services, which some mobile phone service
providers offer (AT&T, 2003).
2.2 Privacy and Location
According to much of the research in location-based
computing, privacy is an essential issue (Snekkenes,
2001; Bisdikian et al., 2001), and the subject is often
addressed in terms of how sensitive information is
kept secured in the application. Privacy is a general
concern, also for stationary application such as web-
based applications, and studies focusing on keeping
sensitive information safe are numerous. In this type
of research, most often identity is at the core of
privacy studies (Langheinrich, 2002). Identity has
several aspects to it and we consider a person’s
position to be a specific attribute of identity, like full
name and social security number. The major
difference between location and most other a ttributes
is that location changes continually and is mostly
relevant to mobile computing.
Where much research focuses on technology
that ensures the user a high level of privacy, there is
a lack of studies that really examine the underlying
need for privacy. Most studies base their research on
the common notion that a high degree of privacy is
essential to the users, but few present research
confirming this. The next section briefly looks into
the most relevant studies of user behaviour and
concern for privacy.
2.3 User Related Studies
Although some studies of users’ privacy and
identification preferences exist, none of them focus
solely on concerns about location-tracking or
positioning. One study examines people’s attitude to
online privacy; the focus is onhow comfortable they
are in revealing identity information to known or
unknown parties (Ackerman et al., 1999). The study
find that their concern for privacy depends on what
types of information they are asked to give up, but
also on the application's usefulness to the user.
Another study compares general privacy concerns in
different situations to the inquirer of the information
and finds that inquirer is a greater determinant for
what people want to reveal, than situation (Lederer et
al., 2002). The study most relevant to our notion of
location privacy, focuses on the social act of
rendezvousing and finds that for example ‘friend
finder’ features will potentially enhance people’s
everyday tasks (Colbert, 2001). The study also
indicates how participants were overly positive
about giving up their location information to a fairly
large group of pre-selected individuals, not unlike
our findings. Finally the study calls for research into
users’ perceived usefulness in exchange for giving
up their position, which is the focus of this study.
The limited number of studies of actual concern
for location privacy means that, while privacy issues
are considered essential to location-tracking, it needs
to be determined how great a concern, location-
based services actually are. We now present the
study we conducted with the goal of determining
peoples’ expected use and concerns about privacy
with respect to location-based services.
3 Research Method
Our study was conducted as an experimental case
study where 16 participants are given a 5-day journal
in which they answer pre-specified questions about
the usefulness and level of concern in using
presented location-based services. A subset of the
participants was interviewed after completing the
journal to elaborate on their entries. Because it was
not possible to implement all the proposed location-
based services, the study asks participants to
‘imagine’ the existence of the services. The services
are outlined in table 1; note that services A and B are
position-aware and servic es C and D are location-
tracking based. At the end of each day, our study
participants reported how many times they would
have used the service and to what degree it would
have been useful to them. Both variables were
measured on a Likert scale from 1 to 5. They also
reported whether they found the tracking of their
location intrusive. The journal also gave them the
option to elaborate on their ratings, which most of
the participants took advantage of. In addition, 5 of
the participants were interviewed to elaborate on
their concerns about location privacy.
Service Description
Service A: Ringing
profiles in private
settings
The mobile phone ‘knows’ when
the user is in a meeting or in class
Service B: Ringing
profiles in public
settings
The mobile phone ‘knows’ when
the user enters a movie theater or
a restaurant
Service C: Lunch
service
A suggestion for lunch is pushed
by the retailer to the mobile
phone when the user is around a
restaurant or fast food place
Service D:
Localization of
predefined friends
The mobile phone can locate
predefined friends and alert the
user when they are within a
certain distance
Table 1: Location-Based Services.
3.1 Participants
The 16 participants were found among young mobile
phone owners and both students and non-students
were selected. Ages ranged between 19 and 35 with a
mean of 23.7. The number of years the participants
had owned a mobile phone varied from 6 months to 6
years with an average of 2.6 years.
4 Perceived Usefulness of
Services
The participants’ perceived usefulness of services
was measured by having the participants answer
how many times they would have used the different
services during the day, as well as directly asking the
participants to rate the usefulness of each service.
Finally, the services were presented again during the
interviews and discussed with participants.
Overall, participants found services A and D
(private ringing profile and localization of friends) to
be the most useful services and service C (lunch) to
be the least useful one. One service for each of our
two types was perceived as useful, whereas the other
two services were not viewed as being that useful, as
seen in table 2. The lunch service is seen as the most
intruding service where the private ringing profiles
are the least intrusive. Service D (localization of
friends) shows an unexpected positive correlation of
0.31 (significant to the .05 level), meaning that if the
participants found the service useful, they were also
likely to find it intrusive.
The self-reported level of use highly correlates
with the participants’ perceived usefulness. While
values for service A, B and D are correlated 0.56, 0.73
and 0.54, accordingly and are all statistically
significant to the .025 level, only values for service C
(lunch service) are not correlated. In general this
service was not used very much as seen in table 2.
Service Rated
useful-
ness
Rated
intrusi-
veness
Average
# of
daily use
Service A: Private
ringing profiles
3.75 2.1 1.5
Service B: Public
ringing profiles
2.6 2.2 0.4
Service C: Lunch
service
2.2 3.7 0.3
Service D:
Localization of
predefined friends
3.75 3.25 1.3
1= not useful at all, 5 = very useful
1= not intrusive, 5 = very intrusive
Table 2: Average rating of the services.
5 Concern for Privacy
Users’ concern about being tracked was assessed by
directly asking them if they found each service
intruding and if they would be worried about their
privacy while using such a service. This issue was
also discussed in the interviews.
We find that people, in general, are not overly
concerned about their privacy when using location-
based services. On a scale from 1 to 5, where 1 is ‘not
concerned’ and 5 is ‘highly concerned’, the
participants averaged 2.75 for all the services. Only 5
of the participants were ‘concerned’ or ‘highly
concerned’ about their privacy for the location-
tracking services, where 11 were either ‘not
concerned’, a ‘little concerned’ or ‘neutral’.
Evaluating the position-aware services, only 3
participants were ‘concerned’ or ‘highly concerned’
for their privacy, where 13 were ‘not concerned’, a
‘little concerned’ or ‘neutral’. The position-aware
services were also rated as less intrusive than the
location-tracking ones, supporting the notion that
people are more concerned when others can track
their location than when their mobile phone reacts to
its own location.
6 Discussion
Our results show that while some services are viewed
as highly useful, the level of intrusiveness and
concerns for privacy are much higher for location-
tracking than for position-aware based services.
Based on previous research, it was our initial
belief that concerns for privacy would be high.
Although few studies have examined people’s
concerns for location-tracking, the vast amount of
technologies focusing on keeping location
information safe lead to the impression that people
are not likely to adopt location-based services.
However, our results show that people are less
concerned about their location being tracked, as long
as they find the service useful.
7 Summary and further research
We have presented two types of location-based
services, location-tracking and position-aware
services. We then presented a case study that
examines people’s concern for privacy in relation to
location-based services and compared people’s
perceived usefulness of the two types of services.
We conclude that although people, in general,
consider both types to be equally useful, the
concerns for privacy are higher when the service is
based on other parties tracking the user’s location.
Because of this finding, we suggest that
development emphasis should initially be on the
more acceptable position-aware services.
Future research should focus on studies
involving implemented technology. Because our
study is based on hypothetical services, the findings
do not necessarily reflect users’ behaviour in a real
setting. Longitudinal studies should also be
conducted to assess if the use level is consistent or
mostly due to initial excitement. Finally, research
focusing on implementing technology to ensure
privacy, should consider looking into what level of
privacy is actually needed and desired by users.
References
Abowd, G. D. et al. (1997) Cyberguide, A mobile context-
aware tour guide. Wireless Networks, 3, pp 421-433.
AT & T (March, 2003), Find your Friend,
www.attws.com/mmode/features/findit
Ackerman, M. S. et al. (1999), Privacy in E-commerce:
Examining user scenarios and privacy preferences, in
Proceedings of Electronic Commerce, pp 1-8.
Bisdikian, C. et al. (2001), Enabling location-based
applications, in Mobile Commerce, pp 38-42.
Cheverst, K. et al. (2000), Experiences of developing and
deploying a context-aware tourist guide: the GUIDE
project, in Proceedings of Mobile Computing and
Networking, pp 20-31.
Colbert, M. (2001), A diary study of rendezvousing:
implications for position-aware computing and
communications for the general public, in Proceedings of
Supporting Group Work, pp 15-23.
Hazas, M. and Ward, A. (2002). A novel broadband
ultrasonic location system, in Proceedings of UbiComp
2002, pp 264-280.
Langheinrich, M. (2002). A privacy awareness system for
ubiquitous computing environments, in Proceedings of
UbiComp, pp 237-245.
Lederer, S., Mankoff, J. and Dey, A. K. (2003), Who wants
to know what when? Privacy preference determinants in
ubiquitous computing, in Proceedings of CHI ’03, pp
724-725.
Ljungstrand, P. (2001), Context awareness and mobile
phones, Personal & Ubiquitous Computing 5(1) 58-61.
Marmasse, N. and Schmandt, C. (2003). Safe & sound – a
wireless leash, in Proceedings of CHI 2003, extended
abstracts, pp 726-727.
Schmidt, A. et al. (1999), There is more to context than
location, Computer & Graphics, 23(6), pp 893-901.
Snekkenes, E. (2001), Concepts for personal location
privacy policies, in Proceedings of Electronic
Commerce, pp 48-57.
Want, R. et al. (1992), The active badge location system,
ACM Transaction on Information Systems, 10(1) 91-
102.

More Related Content

What's hot

Situation Alert and Quality of Service using Collaborative Filtering for Web ...
Situation Alert and Quality of Service using Collaborative Filtering for Web ...Situation Alert and Quality of Service using Collaborative Filtering for Web ...
Situation Alert and Quality of Service using Collaborative Filtering for Web ...IRJET Journal
 
A one decade survey of autonomous mobile robot systems
A one decade survey of autonomous mobile robot systems A one decade survey of autonomous mobile robot systems
A one decade survey of autonomous mobile robot systems IJECEIAES
 
Effects of mobility models and nodes distribution on wireless sensors networks
Effects of mobility models and nodes distribution on wireless sensors networksEffects of mobility models and nodes distribution on wireless sensors networks
Effects of mobility models and nodes distribution on wireless sensors networksijasuc
 
Face to-face proximity estimation using bluetooth on smartphones
Face to-face proximity estimation using bluetooth on smartphonesFace to-face proximity estimation using bluetooth on smartphones
Face to-face proximity estimation using bluetooth on smartphonesJPINFOTECH JAYAPRAKASH
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...IJECEIAES
 
PROVIDING PRIVACY-AWARE INCENTIVES IN MOBILE SENSING SYSTEMS
PROVIDING PRIVACY-AWARE INCENTIVES IN MOBILE SENSING SYSTEMSPROVIDING PRIVACY-AWARE INCENTIVES IN MOBILE SENSING SYSTEMS
PROVIDING PRIVACY-AWARE INCENTIVES IN MOBILE SENSING SYSTEMSNexgen Technology
 
Heterogeneity and the Dynamics of Technology Adoption
Heterogeneity and the Dynamics of Technology AdoptionHeterogeneity and the Dynamics of Technology Adoption
Heterogeneity and the Dynamics of Technology AdoptionVideoguy
 
A New Recommender For The Mobile Web
A New Recommender For The Mobile WebA New Recommender For The Mobile Web
A New Recommender For The Mobile Webzajize
 
Provisioning Quality of Service of Wireless Telemedicine for E-health Services
Provisioning Quality of Service of Wireless  Telemedicine for E-health Services Provisioning Quality of Service of Wireless  Telemedicine for E-health Services
Provisioning Quality of Service of Wireless Telemedicine for E-health Services Mustafa Algaet
 
Involvement of end-users - approaches and exepriences John krogstie
Involvement of end-users - approaches and exepriences John krogstieInvolvement of end-users - approaches and exepriences John krogstie
Involvement of end-users - approaches and exepriences John krogstieAnnika Sällström
 
Indoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual SignsIndoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual SignsShekhar Vimalendu
 
Comparative analysis of augmented datasets performances of age invariant face...
Comparative analysis of augmented datasets performances of age invariant face...Comparative analysis of augmented datasets performances of age invariant face...
Comparative analysis of augmented datasets performances of age invariant face...journalBEEI
 
DeepMood: Modeling Mobile Phone Typing Dynamics for Mood Detection
DeepMood: Modeling Mobile Phone Typing Dynamics for Mood DetectionDeepMood: Modeling Mobile Phone Typing Dynamics for Mood Detection
DeepMood: Modeling Mobile Phone Typing Dynamics for Mood DetectionWilly Marroquin (WillyDevNET)
 
OSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETSOSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETSMaurice Dawson
 
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...ijma
 
Using SMS to Transfer Small Data Packets During (SBRC), 2015
Using SMS to Transfer Small Data Packets During (SBRC), 2015Using SMS to Transfer Small Data Packets During (SBRC), 2015
Using SMS to Transfer Small Data Packets During (SBRC), 2015Carlos Malab
 

What's hot (19)

Situation Alert and Quality of Service using Collaborative Filtering for Web ...
Situation Alert and Quality of Service using Collaborative Filtering for Web ...Situation Alert and Quality of Service using Collaborative Filtering for Web ...
Situation Alert and Quality of Service using Collaborative Filtering for Web ...
 
A one decade survey of autonomous mobile robot systems
A one decade survey of autonomous mobile robot systems A one decade survey of autonomous mobile robot systems
A one decade survey of autonomous mobile robot systems
 
Effects of mobility models and nodes distribution on wireless sensors networks
Effects of mobility models and nodes distribution on wireless sensors networksEffects of mobility models and nodes distribution on wireless sensors networks
Effects of mobility models and nodes distribution on wireless sensors networks
 
Face to-face proximity estimation using bluetooth on smartphones
Face to-face proximity estimation using bluetooth on smartphonesFace to-face proximity estimation using bluetooth on smartphones
Face to-face proximity estimation using bluetooth on smartphones
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...
 
PROVIDING PRIVACY-AWARE INCENTIVES IN MOBILE SENSING SYSTEMS
PROVIDING PRIVACY-AWARE INCENTIVES IN MOBILE SENSING SYSTEMSPROVIDING PRIVACY-AWARE INCENTIVES IN MOBILE SENSING SYSTEMS
PROVIDING PRIVACY-AWARE INCENTIVES IN MOBILE SENSING SYSTEMS
 
Heterogeneity and the Dynamics of Technology Adoption
Heterogeneity and the Dynamics of Technology AdoptionHeterogeneity and the Dynamics of Technology Adoption
Heterogeneity and the Dynamics of Technology Adoption
 
A New Recommender For The Mobile Web
A New Recommender For The Mobile WebA New Recommender For The Mobile Web
A New Recommender For The Mobile Web
 
Provisioning Quality of Service of Wireless Telemedicine for E-health Services
Provisioning Quality of Service of Wireless  Telemedicine for E-health Services Provisioning Quality of Service of Wireless  Telemedicine for E-health Services
Provisioning Quality of Service of Wireless Telemedicine for E-health Services
 
Involvement of end-users - approaches and exepriences John krogstie
Involvement of end-users - approaches and exepriences John krogstieInvolvement of end-users - approaches and exepriences John krogstie
Involvement of end-users - approaches and exepriences John krogstie
 
Networking java titles Adrit Solution
Networking java titles Adrit SolutionNetworking java titles Adrit Solution
Networking java titles Adrit Solution
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Indoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual SignsIndoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual Signs
 
Comparative analysis of augmented datasets performances of age invariant face...
Comparative analysis of augmented datasets performances of age invariant face...Comparative analysis of augmented datasets performances of age invariant face...
Comparative analysis of augmented datasets performances of age invariant face...
 
DeepMood: Modeling Mobile Phone Typing Dynamics for Mood Detection
DeepMood: Modeling Mobile Phone Typing Dynamics for Mood DetectionDeepMood: Modeling Mobile Phone Typing Dynamics for Mood Detection
DeepMood: Modeling Mobile Phone Typing Dynamics for Mood Detection
 
IOT connected with e-learning
IOT connected with e-learningIOT connected with e-learning
IOT connected with e-learning
 
OSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETSOSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETS
 
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...
 
Using SMS to Transfer Small Data Packets During (SBRC), 2015
Using SMS to Transfer Small Data Packets During (SBRC), 2015Using SMS to Transfer Small Data Packets During (SBRC), 2015
Using SMS to Transfer Small Data Packets During (SBRC), 2015
 

Similar to Mobile Location Privacy Study

Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesMigrant Systems
 
Privacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based ServicesPrivacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based ServicesEditorJST
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11DaliaCulbertson719
 
IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...
IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...
IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...Rida Qayyum
 
Application Of Android Enabled Mobile Device For Personal Information Systems
Application Of Android Enabled Mobile Device For Personal Information SystemsApplication Of Android Enabled Mobile Device For Personal Information Systems
Application Of Android Enabled Mobile Device For Personal Information Systemsijasa
 
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...IJERA Editor
 
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSLPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSIJNSA Journal
 
Privacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based QueriesPrivacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based Queriesiosrjce
 
Secure Distributed Collection of Data Using Participator Sensing Paradigm
Secure Distributed Collection of Data Using Participator Sensing ParadigmSecure Distributed Collection of Data Using Participator Sensing Paradigm
Secure Distributed Collection of Data Using Participator Sensing ParadigmIJERA Editor
 
Large scale geospatial analysis on mobile application usage
Large scale geospatial analysis on mobile application usageLarge scale geospatial analysis on mobile application usage
Large scale geospatial analysis on mobile application usageEricsson
 
31 ijcse-01238-9 vetrikodi
31 ijcse-01238-9 vetrikodi31 ijcse-01238-9 vetrikodi
31 ijcse-01238-9 vetrikodiShivlal Mewada
 
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET Journal
 
Comments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data PrivacyComments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data PrivacyMicah Altman
 
Travel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social NetworkingTravel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social NetworkingIRJET Journal
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...ijsptm
 
Study reveals we are being tracked by our smartphones --- every 3 minutes
Study reveals we are being tracked by our smartphones --- every 3 minutesStudy reveals we are being tracked by our smartphones --- every 3 minutes
Study reveals we are being tracked by our smartphones --- every 3 minutesWaqas Amir
 
location based service
location based servicelocation based service
location based serviceDark Side
 

Similar to Mobile Location Privacy Study (20)

Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
 
Privacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based ServicesPrivacy Preservation And Data Security In Location Based Services
Privacy Preservation And Data Security In Location Based Services
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
 
IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...
IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...
IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...
 
Application Of Android Enabled Mobile Device For Personal Information Systems
Application Of Android Enabled Mobile Device For Personal Information SystemsApplication Of Android Enabled Mobile Device For Personal Information Systems
Application Of Android Enabled Mobile Device For Personal Information Systems
 
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
 
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSLPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
 
H017665256
H017665256H017665256
H017665256
 
Privacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based QueriesPrivacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based Queries
 
azd document
azd documentazd document
azd document
 
Secure Distributed Collection of Data Using Participator Sensing Paradigm
Secure Distributed Collection of Data Using Participator Sensing ParadigmSecure Distributed Collection of Data Using Participator Sensing Paradigm
Secure Distributed Collection of Data Using Participator Sensing Paradigm
 
Large scale geospatial analysis on mobile application usage
Large scale geospatial analysis on mobile application usageLarge scale geospatial analysis on mobile application usage
Large scale geospatial analysis on mobile application usage
 
31 ijcse-01238-9 vetrikodi
31 ijcse-01238-9 vetrikodi31 ijcse-01238-9 vetrikodi
31 ijcse-01238-9 vetrikodi
 
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
 
Comments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data PrivacyComments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data Privacy
 
Travel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social NetworkingTravel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social Networking
 
Meet health app
Meet health appMeet health app
Meet health app
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
 
Study reveals we are being tracked by our smartphones --- every 3 minutes
Study reveals we are being tracked by our smartphones --- every 3 minutesStudy reveals we are being tracked by our smartphones --- every 3 minutes
Study reveals we are being tracked by our smartphones --- every 3 minutes
 
location based service
location based servicelocation based service
location based service
 

Mobile Location Privacy Study

  • 1. Copyright 2002, Intel Corporation, All rights reserved. Location-Based Services for Mobile Telephony: a Study of Users’ Privacy Concerns Louise Barkuus, and Anind Dey IRB-TR-03-024 July, 2003 Proceedings of the INTERACT 2003, 9TH IFIP TC13 International Conference on Human-Computer Interaction DISCLAIMER: THIS DOCUMENT IS PROVIDED TO YOU "AS IS" WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY NON-INFRINGEMENT, OR FITNESS FOR ANY PARTICULAR PURPOSE. INTEL AND THE AUTHORS OF THIS DOCUMENT DISCLAIM ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PROPRIETARY RIGHTS, RELATING TO USE OR IMPLEMENTATION OF INFORMATION IN THIS DOCUMENT. THE PROVISION OF THIS DOCUMENT TO YOU DOES NOT PROVIDE YOU WITH ANY LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS
  • 2. Location-Based Services for Mobile Telephony: a study of users’ privacy concerns Louise Barkhuus & Anind Dey The IT University of Copenhagen Glentevej 67, 2400 Copenhagen, Denmark barkhuus@itu.dk Intel Research, Berkeley 2150 Shattuck Avenue, Suite 1300 Berkeley, CA, USA anind@intel-research.net Abstract: Context-aware computing often involves tracking peoples’ location. Many studies and applications highlight the importance of keeping people’s location information private. We discuss two types of location- based services; location-tracking services that are based on other parties tracking the user’s location and position-aware services that rely on the device’s knowledge of its own location. We present an experimental case study that examines people’s concern for location privacy and compare this to the use of location-based services. We find that even though the perceived usefulness of the two different types of services is the same, location- tracking services generate more concern for privacy than posit ion-aware services. We conclude that development emphasis should be given to position-aware services but that location-tracking services have a potential for success if users are given a simple option for turning the location-tracking off. Keywords: Location-based services, context -aware computing, mobile telephony, human-computer interaction 1 Introduction Context-aware computing describes applications, often implemented for mobile devices that adapt to environmental sensor information. Many of these applications rely solely on location information as their context and although some researchers claim that too much attention is given to this type of sensor information (Schmidt et al., 1999), it is predicted that location-based services will be the most common form of context -aware computing (Ljungstrand, 2001). As mobile telephony becomes increasingly common as a handheld computing platform, location-tracking of mobile phones enables location-based services to spread outside closed environments. Location-tracking of customers by mobile telephony providers via GSM and later GPS- enabled services generates a need for addressing privacy issues in relation to the building of location- based technologies and services. We distinguish between two types of location-based services: location-tracking and position-aware (Snekkenes, 2001). Location-tracking services are services relying on the tracking of peoples’ location by other parties such as mobile telephony service providers, whereas position-aware services are bas ed on the device’s own knowledge of its position. Examples of the two services include locating friends or family members and updating the time when entering a new time zone, respectively. By studying peoples’ concern for and use of location-based services , it is our goal to provide insight about the degree to which location- based services are considered to be intrusive on users’ privacy and whether location-tracking or position-aware services generate more concern. We present a case study that examines peoples’ concern for location privacy in relation to location- based services. We presented each study participant with four hypothetical location-based features (two location-tracking and two position-aware services) for their mobile phone, and studied their preferences and concerns as well as their expected use of the services. By comparing the findings, we found that people are positive towards the location-based services as long as they perceive them to be useful. We also found that location-tracking services generate more concern than position-based ones.
  • 3. We first present related work in the area of privacy and location-tracking. Second we present our study and its design and third, we present the results of the study. Finally we discuss these results and conclude that development emphasis should be given to position-aware services and that location- tracking features should be implemented giving the user control over who can track their location. Finally we give suggestions for further research. 2 Related Work Research within location-tracking in indoor environments has been conducted for over a decade. Early work such as the Active Location Badge system (Want et al., 1992) uses infra-red technology but other sensor technologies have been explored as well (Hazas and Ward, 2002). Because we propose location-based services limited to mobile phones, however, the related work falls in the category of outdoor location-tracking using GSM and GPS technologies. This approach generates a different set of privacy issues, since it is likely that people have different concerns about being tracked by, for example, their service provider than their employer. 2.1 Location-Based Services The research focusing on location-based services is vast and a number of these services have been implemented and tested; for example the Guide project (Cheverst et al., 2000) and Cyber Guide (Abowd et al., 1997). Most of these applications use the position-aware approach, meaning that an application’s actions are based on its knowledge of its own position. Location-tracking services, such as safety-based ones, for children or the elderly, have been developed (Marmasse and Schmandt, 2003). Applications outside the research lab include ‘friend finder’ services, which some mobile phone service providers offer (AT&T, 2003). 2.2 Privacy and Location According to much of the research in location-based computing, privacy is an essential issue (Snekkenes, 2001; Bisdikian et al., 2001), and the subject is often addressed in terms of how sensitive information is kept secured in the application. Privacy is a general concern, also for stationary application such as web- based applications, and studies focusing on keeping sensitive information safe are numerous. In this type of research, most often identity is at the core of privacy studies (Langheinrich, 2002). Identity has several aspects to it and we consider a person’s position to be a specific attribute of identity, like full name and social security number. The major difference between location and most other a ttributes is that location changes continually and is mostly relevant to mobile computing. Where much research focuses on technology that ensures the user a high level of privacy, there is a lack of studies that really examine the underlying need for privacy. Most studies base their research on the common notion that a high degree of privacy is essential to the users, but few present research confirming this. The next section briefly looks into the most relevant studies of user behaviour and concern for privacy. 2.3 User Related Studies Although some studies of users’ privacy and identification preferences exist, none of them focus solely on concerns about location-tracking or positioning. One study examines people’s attitude to online privacy; the focus is onhow comfortable they are in revealing identity information to known or unknown parties (Ackerman et al., 1999). The study find that their concern for privacy depends on what types of information they are asked to give up, but also on the application's usefulness to the user. Another study compares general privacy concerns in different situations to the inquirer of the information and finds that inquirer is a greater determinant for what people want to reveal, than situation (Lederer et al., 2002). The study most relevant to our notion of location privacy, focuses on the social act of rendezvousing and finds that for example ‘friend finder’ features will potentially enhance people’s everyday tasks (Colbert, 2001). The study also indicates how participants were overly positive about giving up their location information to a fairly large group of pre-selected individuals, not unlike our findings. Finally the study calls for research into users’ perceived usefulness in exchange for giving up their position, which is the focus of this study. The limited number of studies of actual concern for location privacy means that, while privacy issues are considered essential to location-tracking, it needs to be determined how great a concern, location- based services actually are. We now present the study we conducted with the goal of determining peoples’ expected use and concerns about privacy with respect to location-based services. 3 Research Method Our study was conducted as an experimental case study where 16 participants are given a 5-day journal in which they answer pre-specified questions about
  • 4. the usefulness and level of concern in using presented location-based services. A subset of the participants was interviewed after completing the journal to elaborate on their entries. Because it was not possible to implement all the proposed location- based services, the study asks participants to ‘imagine’ the existence of the services. The services are outlined in table 1; note that services A and B are position-aware and servic es C and D are location- tracking based. At the end of each day, our study participants reported how many times they would have used the service and to what degree it would have been useful to them. Both variables were measured on a Likert scale from 1 to 5. They also reported whether they found the tracking of their location intrusive. The journal also gave them the option to elaborate on their ratings, which most of the participants took advantage of. In addition, 5 of the participants were interviewed to elaborate on their concerns about location privacy. Service Description Service A: Ringing profiles in private settings The mobile phone ‘knows’ when the user is in a meeting or in class Service B: Ringing profiles in public settings The mobile phone ‘knows’ when the user enters a movie theater or a restaurant Service C: Lunch service A suggestion for lunch is pushed by the retailer to the mobile phone when the user is around a restaurant or fast food place Service D: Localization of predefined friends The mobile phone can locate predefined friends and alert the user when they are within a certain distance Table 1: Location-Based Services. 3.1 Participants The 16 participants were found among young mobile phone owners and both students and non-students were selected. Ages ranged between 19 and 35 with a mean of 23.7. The number of years the participants had owned a mobile phone varied from 6 months to 6 years with an average of 2.6 years. 4 Perceived Usefulness of Services The participants’ perceived usefulness of services was measured by having the participants answer how many times they would have used the different services during the day, as well as directly asking the participants to rate the usefulness of each service. Finally, the services were presented again during the interviews and discussed with participants. Overall, participants found services A and D (private ringing profile and localization of friends) to be the most useful services and service C (lunch) to be the least useful one. One service for each of our two types was perceived as useful, whereas the other two services were not viewed as being that useful, as seen in table 2. The lunch service is seen as the most intruding service where the private ringing profiles are the least intrusive. Service D (localization of friends) shows an unexpected positive correlation of 0.31 (significant to the .05 level), meaning that if the participants found the service useful, they were also likely to find it intrusive. The self-reported level of use highly correlates with the participants’ perceived usefulness. While values for service A, B and D are correlated 0.56, 0.73 and 0.54, accordingly and are all statistically significant to the .025 level, only values for service C (lunch service) are not correlated. In general this service was not used very much as seen in table 2. Service Rated useful- ness Rated intrusi- veness Average # of daily use Service A: Private ringing profiles 3.75 2.1 1.5 Service B: Public ringing profiles 2.6 2.2 0.4 Service C: Lunch service 2.2 3.7 0.3 Service D: Localization of predefined friends 3.75 3.25 1.3 1= not useful at all, 5 = very useful 1= not intrusive, 5 = very intrusive Table 2: Average rating of the services. 5 Concern for Privacy Users’ concern about being tracked was assessed by directly asking them if they found each service intruding and if they would be worried about their privacy while using such a service. This issue was also discussed in the interviews. We find that people, in general, are not overly concerned about their privacy when using location- based services. On a scale from 1 to 5, where 1 is ‘not concerned’ and 5 is ‘highly concerned’, the
  • 5. participants averaged 2.75 for all the services. Only 5 of the participants were ‘concerned’ or ‘highly concerned’ about their privacy for the location- tracking services, where 11 were either ‘not concerned’, a ‘little concerned’ or ‘neutral’. Evaluating the position-aware services, only 3 participants were ‘concerned’ or ‘highly concerned’ for their privacy, where 13 were ‘not concerned’, a ‘little concerned’ or ‘neutral’. The position-aware services were also rated as less intrusive than the location-tracking ones, supporting the notion that people are more concerned when others can track their location than when their mobile phone reacts to its own location. 6 Discussion Our results show that while some services are viewed as highly useful, the level of intrusiveness and concerns for privacy are much higher for location- tracking than for position-aware based services. Based on previous research, it was our initial belief that concerns for privacy would be high. Although few studies have examined people’s concerns for location-tracking, the vast amount of technologies focusing on keeping location information safe lead to the impression that people are not likely to adopt location-based services. However, our results show that people are less concerned about their location being tracked, as long as they find the service useful. 7 Summary and further research We have presented two types of location-based services, location-tracking and position-aware services. We then presented a case study that examines people’s concern for privacy in relation to location-based services and compared people’s perceived usefulness of the two types of services. We conclude that although people, in general, consider both types to be equally useful, the concerns for privacy are higher when the service is based on other parties tracking the user’s location. Because of this finding, we suggest that development emphasis should initially be on the more acceptable position-aware services. Future research should focus on studies involving implemented technology. Because our study is based on hypothetical services, the findings do not necessarily reflect users’ behaviour in a real setting. Longitudinal studies should also be conducted to assess if the use level is consistent or mostly due to initial excitement. Finally, research focusing on implementing technology to ensure privacy, should consider looking into what level of privacy is actually needed and desired by users. References Abowd, G. D. et al. (1997) Cyberguide, A mobile context- aware tour guide. Wireless Networks, 3, pp 421-433. AT & T (March, 2003), Find your Friend, www.attws.com/mmode/features/findit Ackerman, M. S. et al. (1999), Privacy in E-commerce: Examining user scenarios and privacy preferences, in Proceedings of Electronic Commerce, pp 1-8. Bisdikian, C. et al. (2001), Enabling location-based applications, in Mobile Commerce, pp 38-42. Cheverst, K. et al. (2000), Experiences of developing and deploying a context-aware tourist guide: the GUIDE project, in Proceedings of Mobile Computing and Networking, pp 20-31. Colbert, M. (2001), A diary study of rendezvousing: implications for position-aware computing and communications for the general public, in Proceedings of Supporting Group Work, pp 15-23. Hazas, M. and Ward, A. (2002). A novel broadband ultrasonic location system, in Proceedings of UbiComp 2002, pp 264-280. Langheinrich, M. (2002). A privacy awareness system for ubiquitous computing environments, in Proceedings of UbiComp, pp 237-245. Lederer, S., Mankoff, J. and Dey, A. K. (2003), Who wants to know what when? Privacy preference determinants in ubiquitous computing, in Proceedings of CHI ’03, pp 724-725. Ljungstrand, P. (2001), Context awareness and mobile phones, Personal & Ubiquitous Computing 5(1) 58-61. Marmasse, N. and Schmandt, C. (2003). Safe & sound – a wireless leash, in Proceedings of CHI 2003, extended abstracts, pp 726-727. Schmidt, A. et al. (1999), There is more to context than location, Computer & Graphics, 23(6), pp 893-901. Snekkenes, E. (2001), Concepts for personal location privacy policies, in Proceedings of Electronic Commerce, pp 48-57. Want, R. et al. (1992), The active badge location system, ACM Transaction on Information Systems, 10(1) 91- 102.