Why and How People Use Location Sharing Services on Social Networking Platforms in China
Shang Gao, Xuemei Zhang
2015
Abstract
Along with the development of information communication technology, there are more and more location sharing services on social networking platforms. Although China has the largest number of internet users in the world, users just started to use location sharing services in the last three years. This study aims to investigate why and how people use location sharing services on social networking platforms in China. To address this, four research questions are presented and 43 in-depth face-to-face interviews are carried out in China. Our results indicated that most users were concerned about privacy issues when they were using location sharing services on social networking platforms. Somewhat surprisingly, some of the interviewees indicated that they were not aware of the availability of the location sharing services on social networking platforms and they did not know how to use location sharing services. Furthermore, with respect to privacy protection, most interviewees indicated that WeChat did a better job than Weibo in China. Lastly, the results revealed that users wanted to use authority management to deal with private issues raised by the shared location information on social networking platforms.
References
- Barth, A., Datta, A., Mitchell, J. C., & Nissenbaum, H. 2006. Privacy and contextual integrity: Framework and applications. In the proceedings of 2006 IEEE Symposium on Security and Privacy. IEEE Press.
- Cramer, H., Rost, M., & Holmquist, L. E. 2011. Performing a check-in: emerging practices, norms and'conflicts' in location-sharing using foursquare. In Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services. ACM.
- Fusco, S. J., Michael, K., Michael, M. G., & Abbas, R. 2010. Exploring the social implications of location based social networking: an inquiry into the perceived positive and negative impacts of using LBSN between friends. In the proceedings of 2010 Ninth International Conference on Mobile Business and 2010 Ninth Global Mobility Roundtable(ICMB-GMR), IEEE Press.
- Gao, S., Krogstie, J., & Siau, K. 2014. Adoption of mobile information services: An empirical study. Mobile Information Systems, 10(2).
- Gao, S., Krogstie, J., Thingstad, T., & Tran, H. 2015. A mobile service using anonymous location-based data: finding reading rooms. The International Journal of Information and Learning Technology, 32(1).
- Grodzinsky, F., & Tavani, H. T. 2010. Applying the “Contextual Integrity” Model of Privacy to Personal Blogs in the Blogoshere, International Journal of Internet Research Ethics, 3(1).
- Kostakos, V., Venkatanathan, J., Reynolds, B., Sadeh, N., Toch, E., Shaikh, S. A., & Jones, S. 2011, Who's your best friend?: targeted privacy attacks In locationsharing social networks, in the Proceedings of the 13th international conference on Ubiquitous computing. ACM.
- Lindqvist, J., Cranshaw, J., Wiese, J., Hong, J., & Zimmerman, J. 2011. I'm the mayor of my house: examining why people use foursquare-a social-driven location sharing application. In the Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM.
- Lipford, H. R., Hull, G., Latulipe, C., Besmer, A., & Watson, J. 2009. Visible flows: Contextual integrity and the design of privacy mechanisms on social network sites. In the Proceedings of International Conference on Computational Science and Engineering, 2009. CSE'09. IEEE Press.
- Lin, J., Benisch, M., Sadeh, N., Niu, J., Hong, J., Lu, B., & Guo, S. 2013. A comparative study of location-sharing privacy preferences in the United States and China. Personal and ubiquitous computing, 17(4).
- Li, M., Zhu, H., Gao, Z., Chen, S., Ren, K., Yu, L., & Hu, S. 2014. All Your Location are Belong to Us: Breaking Mobile Social Networks for Automated User Location Tracking. In the Proceedings of the 15th ACM international symposium on Mobile ad hoc networking and computing. ACM.
- Nissenbaum, H. 2004. Privacy as contextual integrity. Washington law review, 79(1).
- Shi, P., Xu, H., & Chen, Y. 2013. Using contextual integrity to examine interpersonal information boundary on social network sites. In the Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM.
- Tsai, J. Y., Kelley, P. G., Cranor, L. F., & Sadeh, N. 2010. Location-sharing technologies: Privacy risks and controls. ISJLP, 6, 119.
- Zimmer, M. 2008. Privacy on planet Google: Using the theory of contextual integrity to clarify the privacy threats of Google's quest for the perfect search engine. J. Bus. & Tech. L., 3, 109.
- Zhu, C., Wat, K. K., Fang, B., & Liao, S. S. 2012. Privacy and Social Effects in Location Sharing Services. In the proceedings of 2012 IEEE First International Conference on Services Economics. IEEE Press.
Paper Citation
in Harvard Style
Gao S. and Zhang X. (2015). Why and How People Use Location Sharing Services on Social Networking Platforms in China . In Proceedings of the 12th International Conference on e-Business - Volume 1: ICE-B, (ICETE 2015) ISBN 978-989-758-113-7, pages 203-208. DOI: 10.5220/0005571902030208
in Bibtex Style
@conference{ice-b15,
author={Shang Gao and Xuemei Zhang},
title={Why and How People Use Location Sharing Services on Social Networking Platforms in China},
booktitle={Proceedings of the 12th International Conference on e-Business - Volume 1: ICE-B, (ICETE 2015)},
year={2015},
pages={203-208},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005571902030208},
isbn={978-989-758-113-7},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 12th International Conference on e-Business - Volume 1: ICE-B, (ICETE 2015)
TI - Why and How People Use Location Sharing Services on Social Networking Platforms in China
SN - 978-989-758-113-7
AU - Gao S.
AU - Zhang X.
PY - 2015
SP - 203
EP - 208
DO - 10.5220/0005571902030208