SlideShare a Scribd company logo
Empirical Models of
Privacy in Location
Sharing
Eran Toch, Justin Cranshaw, Paul Hankes-Drielsma, Janice Y. Tsai,
Patrick Gage Kelley, James Springfield, Lorrie Cranor, Jason Hong,
Norman Sadeh
Carnegie
Mellon
(1) Motivation
Ubicomp 2010
Carnegie
Mellon
Motivation
4Ubicomp 2010
Carnegie
Mellon
Privacy
‣ Location sharing applications can reveal sensitive
locations (e.g., home,) the activity of the user, social
encounters etc...
‣ Privacy is a major concern that may limit adoption (Tsai
et al. 2009.)
by Frank Groeneveld, Barry Borsboom and Boy van Amstel.
Ubicomp 2010
Carnegie
Mellon
Background
‣ Privacy
‣ Khalil and Connelly
(2006)
‣ Anthony et al. (2007)
‣ Benisch et al. (2010)
Location and Mobility
‣ Eagle et al. (2006)
‣ Gonz´alez et al. (2008)
‣ Mancini et al. (2009)
‣ Cranshaw et al., 2010
Our question: What are the privacy
preferences associated with
locations and mobility patterns?
7Ubicomp 2010
Carnegie
Mellon
Agenda
‣ Locaccino
‣ Study
‣ Results
‣ Conclusions
(2) Locaccino
Ubicomp 2010
Carnegie
Mellon
Locaccino
‣ Location sharing
application
‣ Expressive privacy
controls
‣ Background location
tracking
‣ Research framework
10Ubicomp 2010
Carnegie
Mellon
Locators
‣ Background location reporting every 2-10 minutes,
depending on movement
‣ On laptops: Location WiFi positioning by Skyhook
‣ On smartphones: WiFi positioning + GPS
For Mac and Windows
Ubicomp 2010
Carnegie
Mellon
Setting Privacy Policy
Ubicomp 2010
Carnegie
Mellon
Requesting Locations
(3) Study
Ubicomp 2010
Carnegie
Mellon
Study
‣ 28 primary participants were recruited using flyers scattered
around the Carnegie Mellon Campus and mailing list
posting. They were compensated at $30 + data plan.
‣ 373 secondary participants had joined by invitation of
primary participants. They were not compensated.
‣ 230 of them installed a locator, and were requested by
other participants.
1. Answering
Entrance
Survey
3. Installing locator
4. Setting up privacy
policy
5. Inviting friends
3. Using
Locaccino
4. Answering
Place Survey +
Exit Survey
2. Randomly
assigned a
locator
Ubicomp 2010
Carnegie
Mellon
Population and Limitation
‣ All participants are from the university
community.
‣ 17 graduate students, 9 undergraduate
students and 2 staff members.
‣ The study was conducted in a single
city (Pittsburgh.)
‣ And in the course of a single summer
month.
(4) Results
Ubicomp 2010
Carnegie
Mellon
Location Entropy
‣ Entropy is a measure for the
diversity of visitors to a place
(Cranshaw et al., 2010)
‣ Borrowed from bio-diversity,
it assigns high values to places
visited by many users in equal
proportions.
‣ Let p(u,l) be the observations
of a user u in a location l.
Entropy is defined as:
High entropy (5+)
Medium entropy (1-5)
Low entropy (1)
Locations are defined based a 100m radius
Ubicomp 2010
Carnegie
Mellon
Place Survey
Ubicomp 2010
Carnegie
Mellon
Entropy vs. Comfort in sharing locations
Users were more
comfortable sharing
high entropy
locations.
ANOVA, friends: F=5.46
p=0.02, distant relations:
F = 15.57 p=0.001
The correlation is
stronger for distant
social relations than
with close social
relations
Ubicomp 2010
Carnegie
Mellon
Sharing by Place Type
Tags were grouped by a team of 3 judges to 8 categories
For distant relations
Ubicomp 2010
Carnegie
Mellon
Privacy and Mobility
• Visible mobility is
correlated with the
number of request for the
user (ANOVA: F = 14.713
p = 0.00079)
‣ High mobility users were
requested twice as much
as low mobility users.
‣ Number of friends and the
users’ activity are non
significant.
High
mobility
users
Low
mobility
users
Visible mobility
Number of unique daily locations
Median: 3.4
Ubicomp 2010
Carnegie
Mellon
Requests over time
The request rate for high mobility users increased
twofold over the course of the study
Ubicomp 2010
Carnegie
Mellon
Privacy and Mobility
Item ANOVA F ANOVA P-value
Expressiveness (number of
policy restrictions)
5.63 0.025
Number of privacy policy
updates
10.75 0.0028
Correlation between visible mobility and privacy properties
High mobility users were 4 times as likely to use location
restrictions and 7 times more likely to use time restrictions
24Ubicomp 2010
Carnegie
Mellon
Rule Examples
Ubicomp 2010
Carnegie
Mellon
Survey Results
Item Average ANOVA F ANOVA P-value
Overall Usefulness 4.74 4.54 0.043
Friends rules usefulness 5.48 4.68 0.04
Time rules usefulness 4.74 5.14 0.03
Location rules
usefulness 5.14 4.15 0.052
‣Correlation between visible mobility and survey results
7-point Likert (1 stands for not useful and 7 for very useful)
(4) Conclusions
Ubicomp 2010
Carnegie
Mellon
Conclusions
‣ Some privacy preferences can be predicted
by location entropy and mobility.
‣ Enhancing location sharing: by suggesting helpful
defaults, checking-in in high entropy places etc.
‣ Establishing privacy sensitive location reporting for
location aware systems.
‣ Other fields? Is entropy related to other phenomena?
Check Session VII
‣ Lots of future work...
Thank you
More info: http://www.cs.cmu.edu/~eran/
Carnegie
Mellon
Locaccino demo - tomorrow’s lunch
Ubicomp 2010
Carnegie
Mellon
Location Privacy Preferences
‣Which measure best predicts the location privacy
preferences?
ANOVA p-value
Measure friends and
family
distant relations
Number of unique visitors 0.48 0.3
Number of observations 0.17 0.001
User’s visits to the location 0.98 0.22
Location entropy 0.02 0.001
30Ubicomp 2010
Carnegie
Mellon
Statistics
Item Average
Number of friends 12.86
Number of location observations 1,417,095

More Related Content

Similar to Empirical Models of Privacy in Location Sharing, at Ubicomp2010

How far how near psychological distance matters in the online travel reviews:...
How far how near psychological distance matters in the online travel reviews:...How far how near psychological distance matters in the online travel reviews:...
How far how near psychological distance matters in the online travel reviews:...
International Federation for Information Technologies in Travel and Tourism (IFITT)
 
10.1.1.10.527 (1)
10.1.1.10.527 (1)10.1.1.10.527 (1)
10.1.1.10.527 (1)nilesh_2188
 
Nicolas GERBER "The economics of land degradation and the costs of action ver...
Nicolas GERBER "The economics of land degradation and the costs of action ver...Nicolas GERBER "The economics of land degradation and the costs of action ver...
Nicolas GERBER "The economics of land degradation and the costs of action ver...
Global Risk Forum GRFDavos
 
B00624300_EGM701_MSc ResearchPaper_AlfredoConetta_03-May-15
B00624300_EGM701_MSc ResearchPaper_AlfredoConetta_03-May-15B00624300_EGM701_MSc ResearchPaper_AlfredoConetta_03-May-15
B00624300_EGM701_MSc ResearchPaper_AlfredoConetta_03-May-15Alfie Conetta MSc BSc(Hon) FRGS
 
The Unfairness of Active Users and Popularity Bias in Point-of-Interest Recom...
The Unfairness of Active Users and Popularity Bias in Point-of-Interest Recom...The Unfairness of Active Users and Popularity Bias in Point-of-Interest Recom...
The Unfairness of Active Users and Popularity Bias in Point-of-Interest Recom...
Hossein A. (Saeed) Rahmani
 
Methodological Approach for Mobile Studies
Methodological Approach for Mobile StudiesMethodological Approach for Mobile Studies
Methodological Approach for Mobile Studies
Simon Fraser University
 
EDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul SimonEDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul Simon
Paul Simon
 
Evaluation Methods for Social XR Experiences
Evaluation Methods for Social XR ExperiencesEvaluation Methods for Social XR Experiences
Evaluation Methods for Social XR Experiences
Mark Billinghurst
 
Data visualisations: drawing actionable insights from science and technology ...
Data visualisations: drawing actionable insights from science and technology ...Data visualisations: drawing actionable insights from science and technology ...
Data visualisations: drawing actionable insights from science and technology ...
EFSA EU
 
David Nicholas, Ciber: Audience Analysis and Modelling, the case of CIBER and...
David Nicholas, Ciber: Audience Analysis and Modelling, the case of CIBER and...David Nicholas, Ciber: Audience Analysis and Modelling, the case of CIBER and...
David Nicholas, Ciber: Audience Analysis and Modelling, the case of CIBER and...michellep
 
What is qualitative research? Discuss the methods of qualitative research.pdf
What is qualitative research?  Discuss the methods of qualitative research.pdfWhat is qualitative research?  Discuss the methods of qualitative research.pdf
What is qualitative research? Discuss the methods of qualitative research.pdf
Md. Sajjat Hossain
 
Health Informatics Seminar Summary
Health Informatics Seminar SummaryHealth Informatics Seminar Summary
Health Informatics Seminar Summary
jetweedy
 
Remote sensing-derived national land cover land use maps: a comparison for Ma...
Remote sensing-derived national land cover land use maps: a comparison for Ma...Remote sensing-derived national land cover land use maps: a comparison for Ma...
Remote sensing-derived national land cover land use maps: a comparison for Ma...
rsmahabir
 
Global Land Cover and Intelligent Analysis of Remote Sensed Images
Global  Land Cover and Intelligent Analysis of Remote Sensed ImagesGlobal  Land Cover and Intelligent Analysis of Remote Sensed Images
Global Land Cover and Intelligent Analysis of Remote Sensed Images
Maria Antonia Brovelli
 
Towards a better understanding of the cognitive destination image of the Basq...
Towards a better understanding of the cognitive destination image of the Basq...Towards a better understanding of the cognitive destination image of the Basq...
Towards a better understanding of the cognitive destination image of the Basq...
International Federation for Information Technologies in Travel and Tourism (IFITT)
 
Studying information behavior: The Many Faces of Digital Visitors and Residents
Studying information behavior: The Many Faces of Digital Visitors and ResidentsStudying information behavior: The Many Faces of Digital Visitors and Residents
Studying information behavior: The Many Faces of Digital Visitors and Residents
Lynn Connaway
 
Studying information behavior: The Many Faces of Digital Visitors and Residents
Studying information behavior: The Many Faces of Digital Visitors and ResidentsStudying information behavior: The Many Faces of Digital Visitors and Residents
Studying information behavior: The Many Faces of Digital Visitors and Residents
OCLC
 
From global to local: How can spatial conservation prioritization inform con...
From global to local:  How can spatial conservation prioritization inform con...From global to local:  How can spatial conservation prioritization inform con...
From global to local: How can spatial conservation prioritization inform con...
jlehtoma
 
Impact of Interstate Bus terminal on the Builtform of Residential Neighbourho...
Impact of Interstate Bus terminal on the Builtform of Residential Neighbourho...Impact of Interstate Bus terminal on the Builtform of Residential Neighbourho...
Impact of Interstate Bus terminal on the Builtform of Residential Neighbourho...
Shivika Mehrotra
 
Making Connections and Scheduling on the Route to School: The Smartphone enab...
Making Connections and Scheduling on the Route to School: The Smartphone enab...Making Connections and Scheduling on the Route to School: The Smartphone enab...
Making Connections and Scheduling on the Route to School: The Smartphone enab...
Fraser McLeod
 

Similar to Empirical Models of Privacy in Location Sharing, at Ubicomp2010 (20)

How far how near psychological distance matters in the online travel reviews:...
How far how near psychological distance matters in the online travel reviews:...How far how near psychological distance matters in the online travel reviews:...
How far how near psychological distance matters in the online travel reviews:...
 
10.1.1.10.527 (1)
10.1.1.10.527 (1)10.1.1.10.527 (1)
10.1.1.10.527 (1)
 
Nicolas GERBER "The economics of land degradation and the costs of action ver...
Nicolas GERBER "The economics of land degradation and the costs of action ver...Nicolas GERBER "The economics of land degradation and the costs of action ver...
Nicolas GERBER "The economics of land degradation and the costs of action ver...
 
B00624300_EGM701_MSc ResearchPaper_AlfredoConetta_03-May-15
B00624300_EGM701_MSc ResearchPaper_AlfredoConetta_03-May-15B00624300_EGM701_MSc ResearchPaper_AlfredoConetta_03-May-15
B00624300_EGM701_MSc ResearchPaper_AlfredoConetta_03-May-15
 
The Unfairness of Active Users and Popularity Bias in Point-of-Interest Recom...
The Unfairness of Active Users and Popularity Bias in Point-of-Interest Recom...The Unfairness of Active Users and Popularity Bias in Point-of-Interest Recom...
The Unfairness of Active Users and Popularity Bias in Point-of-Interest Recom...
 
Methodological Approach for Mobile Studies
Methodological Approach for Mobile StudiesMethodological Approach for Mobile Studies
Methodological Approach for Mobile Studies
 
EDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul SimonEDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul Simon
 
Evaluation Methods for Social XR Experiences
Evaluation Methods for Social XR ExperiencesEvaluation Methods for Social XR Experiences
Evaluation Methods for Social XR Experiences
 
Data visualisations: drawing actionable insights from science and technology ...
Data visualisations: drawing actionable insights from science and technology ...Data visualisations: drawing actionable insights from science and technology ...
Data visualisations: drawing actionable insights from science and technology ...
 
David Nicholas, Ciber: Audience Analysis and Modelling, the case of CIBER and...
David Nicholas, Ciber: Audience Analysis and Modelling, the case of CIBER and...David Nicholas, Ciber: Audience Analysis and Modelling, the case of CIBER and...
David Nicholas, Ciber: Audience Analysis and Modelling, the case of CIBER and...
 
What is qualitative research? Discuss the methods of qualitative research.pdf
What is qualitative research?  Discuss the methods of qualitative research.pdfWhat is qualitative research?  Discuss the methods of qualitative research.pdf
What is qualitative research? Discuss the methods of qualitative research.pdf
 
Health Informatics Seminar Summary
Health Informatics Seminar SummaryHealth Informatics Seminar Summary
Health Informatics Seminar Summary
 
Remote sensing-derived national land cover land use maps: a comparison for Ma...
Remote sensing-derived national land cover land use maps: a comparison for Ma...Remote sensing-derived national land cover land use maps: a comparison for Ma...
Remote sensing-derived national land cover land use maps: a comparison for Ma...
 
Global Land Cover and Intelligent Analysis of Remote Sensed Images
Global  Land Cover and Intelligent Analysis of Remote Sensed ImagesGlobal  Land Cover and Intelligent Analysis of Remote Sensed Images
Global Land Cover and Intelligent Analysis of Remote Sensed Images
 
Towards a better understanding of the cognitive destination image of the Basq...
Towards a better understanding of the cognitive destination image of the Basq...Towards a better understanding of the cognitive destination image of the Basq...
Towards a better understanding of the cognitive destination image of the Basq...
 
Studying information behavior: The Many Faces of Digital Visitors and Residents
Studying information behavior: The Many Faces of Digital Visitors and ResidentsStudying information behavior: The Many Faces of Digital Visitors and Residents
Studying information behavior: The Many Faces of Digital Visitors and Residents
 
Studying information behavior: The Many Faces of Digital Visitors and Residents
Studying information behavior: The Many Faces of Digital Visitors and ResidentsStudying information behavior: The Many Faces of Digital Visitors and Residents
Studying information behavior: The Many Faces of Digital Visitors and Residents
 
From global to local: How can spatial conservation prioritization inform con...
From global to local:  How can spatial conservation prioritization inform con...From global to local:  How can spatial conservation prioritization inform con...
From global to local: How can spatial conservation prioritization inform con...
 
Impact of Interstate Bus terminal on the Builtform of Residential Neighbourho...
Impact of Interstate Bus terminal on the Builtform of Residential Neighbourho...Impact of Interstate Bus terminal on the Builtform of Residential Neighbourho...
Impact of Interstate Bus terminal on the Builtform of Residential Neighbourho...
 
Making Connections and Scheduling on the Route to School: The Smartphone enab...
Making Connections and Scheduling on the Route to School: The Smartphone enab...Making Connections and Scheduling on the Route to School: The Smartphone enab...
Making Connections and Scheduling on the Route to School: The Smartphone enab...
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 

Empirical Models of Privacy in Location Sharing, at Ubicomp2010

Editor's Notes

  1. The one measure that was significant was location entropy
  2. We showed unique locations - 500 meters away from other places And only locations in which they were 5 minutes or more
  3. Number of observations has a bias in in homes. If users visits their home a lot, then they will have high entropy.