SlideShare una empresa de Scribd logo
1 de 30
Empirical Models of
Privacy in Location
Sharing
Eran Toch, Justin Cranshaw, Paul Hankes-Drielsma, Janice Y. Tsai,
Patrick Gage Kelley, James Springfield, Lorrie Cranor, Jason Hong,
Norman Sadeh
Carnegie
Mellon
(1) Motivation
Ubicomp 2010
Carnegie
Mellon
Motivation
4Ubicomp 2010
Carnegie
Mellon
Privacy
‣ Location sharing applications can reveal sensitive
locations (e.g., home,) the activity of the user, social
encounters etc...
‣ Privacy is a major concern that may limit adoption (Tsai
et al. 2009.)
by Frank Groeneveld, Barry Borsboom and Boy van Amstel.
Ubicomp 2010
Carnegie
Mellon
Background
‣ Privacy
‣ Khalil and Connelly
(2006)
‣ Anthony et al. (2007)
‣ Benisch et al. (2010)
Location and Mobility
‣ Eagle et al. (2006)
‣ Gonz´alez et al. (2008)
‣ Mancini et al. (2009)
‣ Cranshaw et al., 2010
Our question: What are the privacy
preferences associated with
locations and mobility patterns?
7Ubicomp 2010
Carnegie
Mellon
Agenda
‣ Locaccino
‣ Study
‣ Results
‣ Conclusions
(2) Locaccino
Ubicomp 2010
Carnegie
Mellon
Locaccino
‣ Location sharing
application
‣ Expressive privacy
controls
‣ Background location
tracking
‣ Research framework
10Ubicomp 2010
Carnegie
Mellon
Locators
‣ Background location reporting every 2-10 minutes,
depending on movement
‣ On laptops: Location WiFi positioning by Skyhook
‣ On smartphones: WiFi positioning + GPS
For Mac and Windows
Ubicomp 2010
Carnegie
Mellon
Setting Privacy Policy
Ubicomp 2010
Carnegie
Mellon
Requesting Locations
(3) Study
Ubicomp 2010
Carnegie
Mellon
Study
‣ 28 primary participants were recruited using flyers scattered
around the Carnegie Mellon Campus and mailing list
posting. They were compensated at $30 + data plan.
‣ 373 secondary participants had joined by invitation of
primary participants. They were not compensated.
‣ 230 of them installed a locator, and were requested by
other participants.
1. Answering
Entrance
Survey
3. Installing locator
4. Setting up privacy
policy
5. Inviting friends
3. Using
Locaccino
4. Answering
Place Survey +
Exit Survey
2. Randomly
assigned a
locator
Ubicomp 2010
Carnegie
Mellon
Population and Limitation
‣ All participants are from the university
community.
‣ 17 graduate students, 9 undergraduate
students and 2 staff members.
‣ The study was conducted in a single
city (Pittsburgh.)
‣ And in the course of a single summer
month.
(4) Results
Ubicomp 2010
Carnegie
Mellon
Location Entropy
‣ Entropy is a measure for the
diversity of visitors to a place
(Cranshaw et al., 2010)
‣ Borrowed from bio-diversity,
it assigns high values to places
visited by many users in equal
proportions.
‣ Let p(u,l) be the observations
of a user u in a location l.
Entropy is defined as:
High entropy (5+)
Medium entropy (1-5)
Low entropy (1)
Locations are defined based a 100m radius
Ubicomp 2010
Carnegie
Mellon
Place Survey
Ubicomp 2010
Carnegie
Mellon
Entropy vs. Comfort in sharing locations
Users were more
comfortable sharing
high entropy
locations.
ANOVA, friends: F=5.46
p=0.02, distant relations:
F = 15.57 p=0.001
The correlation is
stronger for distant
social relations than
with close social
relations
Ubicomp 2010
Carnegie
Mellon
Sharing by Place Type
Tags were grouped by a team of 3 judges to 8 categories
For distant relations
Ubicomp 2010
Carnegie
Mellon
Privacy and Mobility
• Visible mobility is
correlated with the
number of request for the
user (ANOVA: F = 14.713
p = 0.00079)
‣ High mobility users were
requested twice as much
as low mobility users.
‣ Number of friends and the
users’ activity are non
significant.
High
mobility
users
Low
mobility
users
Visible mobility
Number of unique daily locations
Median: 3.4
Ubicomp 2010
Carnegie
Mellon
Requests over time
The request rate for high mobility users increased
twofold over the course of the study
Ubicomp 2010
Carnegie
Mellon
Privacy and Mobility
Item ANOVA F ANOVA P-value
Expressiveness (number of
policy restrictions)
5.63 0.025
Number of privacy policy
updates
10.75 0.0028
Correlation between visible mobility and privacy properties
High mobility users were 4 times as likely to use location
restrictions and 7 times more likely to use time restrictions
24Ubicomp 2010
Carnegie
Mellon
Rule Examples
Ubicomp 2010
Carnegie
Mellon
Survey Results
Item Average ANOVA F ANOVA P-value
Overall Usefulness 4.74 4.54 0.043
Friends rules usefulness 5.48 4.68 0.04
Time rules usefulness 4.74 5.14 0.03
Location rules
usefulness 5.14 4.15 0.052
‣Correlation between visible mobility and survey results
7-point Likert (1 stands for not useful and 7 for very useful)
(4) Conclusions
Ubicomp 2010
Carnegie
Mellon
Conclusions
‣ Some privacy preferences can be predicted
by location entropy and mobility.
‣ Enhancing location sharing: by suggesting helpful
defaults, checking-in in high entropy places etc.
‣ Establishing privacy sensitive location reporting for
location aware systems.
‣ Other fields? Is entropy related to other phenomena?
Check Session VII
‣ Lots of future work...
Thank you
More info: http://www.cs.cmu.edu/~eran/
Carnegie
Mellon
Locaccino demo - tomorrow’s lunch
Ubicomp 2010
Carnegie
Mellon
Location Privacy Preferences
‣Which measure best predicts the location privacy
preferences?
ANOVA p-value
Measure friends and
family
distant relations
Number of unique visitors 0.48 0.3
Number of observations 0.17 0.001
User’s visits to the location 0.98 0.22
Location entropy 0.02 0.001
30Ubicomp 2010
Carnegie
Mellon
Statistics
Item Average
Number of friends 12.86
Number of location observations 1,417,095

Más contenido relacionado

Similar a Empirical Models of Privacy in Location Sharing, at Ubicomp2010

10.1.1.10.527 (1)
10.1.1.10.527 (1)10.1.1.10.527 (1)
10.1.1.10.527 (1)
nilesh_2188
 
B00624300_EGM701_MSc ResearchPaper_AlfredoConetta_03-May-15
B00624300_EGM701_MSc ResearchPaper_AlfredoConetta_03-May-15B00624300_EGM701_MSc ResearchPaper_AlfredoConetta_03-May-15
B00624300_EGM701_MSc ResearchPaper_AlfredoConetta_03-May-15
Alfie Conetta MSc BSc(Hon) FRGS
 
David Nicholas, Ciber: Audience Analysis and Modelling, the case of CIBER and...
David Nicholas, Ciber: Audience Analysis and Modelling, the case of CIBER and...David Nicholas, Ciber: Audience Analysis and Modelling, the case of CIBER and...
David Nicholas, Ciber: Audience Analysis and Modelling, the case of CIBER and...
michellep
 
Health Informatics Seminar Summary
Health Informatics Seminar SummaryHealth Informatics Seminar Summary
Health Informatics Seminar Summary
jetweedy
 
Impact of Interstate Bus terminal on the Builtform of Residential Neighbourho...
Impact of Interstate Bus terminal on the Builtform of Residential Neighbourho...Impact of Interstate Bus terminal on the Builtform of Residential Neighbourho...
Impact of Interstate Bus terminal on the Builtform of Residential Neighbourho...
Shivika Mehrotra
 

Similar a Empirical Models of Privacy in Location Sharing, at Ubicomp2010 (20)

How far how near psychological distance matters in the online travel reviews:...
How far how near psychological distance matters in the online travel reviews:...How far how near psychological distance matters in the online travel reviews:...
How far how near psychological distance matters in the online travel reviews:...
 
10.1.1.10.527 (1)
10.1.1.10.527 (1)10.1.1.10.527 (1)
10.1.1.10.527 (1)
 
Nicolas GERBER "The economics of land degradation and the costs of action ver...
Nicolas GERBER "The economics of land degradation and the costs of action ver...Nicolas GERBER "The economics of land degradation and the costs of action ver...
Nicolas GERBER "The economics of land degradation and the costs of action ver...
 
B00624300_EGM701_MSc ResearchPaper_AlfredoConetta_03-May-15
B00624300_EGM701_MSc ResearchPaper_AlfredoConetta_03-May-15B00624300_EGM701_MSc ResearchPaper_AlfredoConetta_03-May-15
B00624300_EGM701_MSc ResearchPaper_AlfredoConetta_03-May-15
 
The Unfairness of Active Users and Popularity Bias in Point-of-Interest Recom...
The Unfairness of Active Users and Popularity Bias in Point-of-Interest Recom...The Unfairness of Active Users and Popularity Bias in Point-of-Interest Recom...
The Unfairness of Active Users and Popularity Bias in Point-of-Interest Recom...
 
Methodological Approach for Mobile Studies
Methodological Approach for Mobile StudiesMethodological Approach for Mobile Studies
Methodological Approach for Mobile Studies
 
EDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul SimonEDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul Simon
 
Evaluation Methods for Social XR Experiences
Evaluation Methods for Social XR ExperiencesEvaluation Methods for Social XR Experiences
Evaluation Methods for Social XR Experiences
 
Data visualisations: drawing actionable insights from science and technology ...
Data visualisations: drawing actionable insights from science and technology ...Data visualisations: drawing actionable insights from science and technology ...
Data visualisations: drawing actionable insights from science and technology ...
 
David Nicholas, Ciber: Audience Analysis and Modelling, the case of CIBER and...
David Nicholas, Ciber: Audience Analysis and Modelling, the case of CIBER and...David Nicholas, Ciber: Audience Analysis and Modelling, the case of CIBER and...
David Nicholas, Ciber: Audience Analysis and Modelling, the case of CIBER and...
 
What is qualitative research? Discuss the methods of qualitative research.pdf
What is qualitative research?  Discuss the methods of qualitative research.pdfWhat is qualitative research?  Discuss the methods of qualitative research.pdf
What is qualitative research? Discuss the methods of qualitative research.pdf
 
Health Informatics Seminar Summary
Health Informatics Seminar SummaryHealth Informatics Seminar Summary
Health Informatics Seminar Summary
 
Remote sensing-derived national land cover land use maps: a comparison for Ma...
Remote sensing-derived national land cover land use maps: a comparison for Ma...Remote sensing-derived national land cover land use maps: a comparison for Ma...
Remote sensing-derived national land cover land use maps: a comparison for Ma...
 
Global Land Cover and Intelligent Analysis of Remote Sensed Images
Global  Land Cover and Intelligent Analysis of Remote Sensed ImagesGlobal  Land Cover and Intelligent Analysis of Remote Sensed Images
Global Land Cover and Intelligent Analysis of Remote Sensed Images
 
Towards a better understanding of the cognitive destination image of the Basq...
Towards a better understanding of the cognitive destination image of the Basq...Towards a better understanding of the cognitive destination image of the Basq...
Towards a better understanding of the cognitive destination image of the Basq...
 
Studying information behavior: The Many Faces of Digital Visitors and Residents
Studying information behavior: The Many Faces of Digital Visitors and ResidentsStudying information behavior: The Many Faces of Digital Visitors and Residents
Studying information behavior: The Many Faces of Digital Visitors and Residents
 
Studying information behavior: The Many Faces of Digital Visitors and Residents
Studying information behavior: The Many Faces of Digital Visitors and ResidentsStudying information behavior: The Many Faces of Digital Visitors and Residents
Studying information behavior: The Many Faces of Digital Visitors and Residents
 
From global to local: How can spatial conservation prioritization inform con...
From global to local:  How can spatial conservation prioritization inform con...From global to local:  How can spatial conservation prioritization inform con...
From global to local: How can spatial conservation prioritization inform con...
 
Impact of Interstate Bus terminal on the Builtform of Residential Neighbourho...
Impact of Interstate Bus terminal on the Builtform of Residential Neighbourho...Impact of Interstate Bus terminal on the Builtform of Residential Neighbourho...
Impact of Interstate Bus terminal on the Builtform of Residential Neighbourho...
 
Making Connections and Scheduling on the Route to School: The Smartphone enab...
Making Connections and Scheduling on the Route to School: The Smartphone enab...Making Connections and Scheduling on the Route to School: The Smartphone enab...
Making Connections and Scheduling on the Route to School: The Smartphone enab...
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

Empirical Models of Privacy in Location Sharing, at Ubicomp2010

Notas del editor

  1. The one measure that was significant was location entropy
  2. We showed unique locations - 500 meters away from other places And only locations in which they were 5 minutes or more
  3. Number of observations has a bias in in homes. If users visits their home a lot, then they will have high entropy.