to use authority management (A11, A13) to deal
with private issues raised by the shared location
information on social networking platforms.
However, we were also aware of some
limitations of this research. First, the sample in this
study was quite narrow in terms of age range since
all participants in our interviews were under 25
years old. This sample might not be fully
representative of the entire population in China. For
example, the generalizability of the findings to other
groups of users (e.g., older adults) remains to be
determined. Second, the self-reporting nature of this
study is another limitation. Last but not least, we
only studied location sharing services on two
popular social networking platforms in China. This
may limit the generalizability of our findings.
Continuing with this stream of research, we plan
to test other age groups to see the generalizability of
our findings in this study. Future research is also
needed to empirically examine potential factors
influence users’ adoption of location sharing
services in terms of a research model with larger
samples in China. We also would like to record
users’ historical behaviour on using location sharing
services to further analysis users’ usage patterns.
REFERENCES
Barth, A., Datta, A., Mitchell, J. C., & Nissenbaum, H.
2006. Privacy and contextual integrity: Framework
and applications. In the proceedings of 2006 IEEE
Symposium on Security and Privacy. IEEE Press.
Cramer, H., Rost, M., & Holmquist, L. E. 2011.
Performing a check-in: emerging practices, norms
and'conflicts' in location-sharing using foursquare.
In Proceedings of the 13th International Conference
on Human Computer Interaction with Mobile Devices
and Services. ACM.
Fusco, S. J., Michael, K., Michael, M. G., & Abbas, R.
2010. Exploring the social implications of location
based social networking: an inquiry into the perceived
positive and negative impacts of using LBSN between
friends. In the proceedings of 2010 Ninth International
Conference on Mobile Business and 2010 Ninth
Global Mobility Roundtable(ICMB-GMR), IEEE
Press.
Gao, S., Krogstie, J., & Siau, K. 2014. Adoption of mobile
information services: An empirical study. Mobile
Information Systems, 10(2).
Gao, S., Krogstie, J., Thingstad, T., & Tran, H. 2015. A
mobile service using anonymous location-based data:
finding reading rooms. The International Journal of
Information and Learning Technology, 32(1).
Grodzinsky, F., & Tavani, H. T. 2010. Applying the
“Contextual Integrity” Model of Privacy to Personal
Blogs in the Blogoshere, International Journal of
Internet Research Ethics, 3(1).
Kostakos, V., Venkatanathan, J., Reynolds, B., Sadeh, N.,
Toch, E., Shaikh, S. A., & Jones, S. 2011, Who's your
best friend?: targeted privacy attacks In location-
sharing social networks, in the Proceedings of the 13th
international conference on Ubiquitous computing.
ACM.
Lindqvist, J., Cranshaw, J., Wiese, J., Hong, J., &
Zimmerman, J. 2011. I'm the mayor of my house:
examining why people use foursquare-a social-driven
location sharing application. In the Proceedings of the
SIGCHI Conference on Human Factors in Computing
Systems. ACM.
Lipford, H. R., Hull, G., Latulipe, C., Besmer, A., &
Watson, J. 2009. Visible flows: Contextual integrity
and the design of privacy mechanisms on social
network sites. In the Proceedings of International
Conference on Computational Science and
Engineering, 2009. CSE'09. IEEE Press.
Lin, J., Benisch, M., Sadeh, N., Niu, J., Hong, J., Lu, B., &
Guo, S. 2013. A comparative study of location-sharing
privacy preferences in the United States and
China. Personal and ubiquitous computing, 17(4).
Li, M., Zhu, H., Gao, Z., Chen, S., Ren, K., Yu, L., & Hu,
S. 2014. All Your Location are Belong to Us:
Breaking Mobile Social Networks for Automated User
Location Tracking. In the Proceedings of the 15th
ACM international symposium on Mobile ad hoc
networking and computing. ACM.
Nissenbaum, H. 2004. Privacy as contextual
integrity. Washington law review, 79(1).
Shi, P., Xu, H., & Chen, Y. 2013. Using contextual
integrity to examine interpersonal information
boundary on social network sites. In the Proceedings
of the SIGCHI Conference on Human Factors in
Computing Systems. ACM.
Tsai, J. Y., Kelley, P. G., Cranor, L. F., & Sadeh, N. 2010.
Location-sharing technologies: Privacy risks and
controls. ISJLP, 6, 119.
Zimmer, M. 2008. Privacy on planet Google: Using the
theory of contextual integrity to clarify the privacy
threats of Google's quest for the perfect search
engine. J. Bus. & Tech. L., 3, 109.
Zhu, C., Wat, K. K., Fang, B., & Liao, S. S. 2012. Privacy
and Social Effects in Location Sharing Services. In the
proceedings of 2012 IEEE First International
Conference on Services Economics. IEEE Press.
ICE-B2015-InternationalConferenceone-Business
208