Location-Sharing Technologies: Privacy Risks and Controls
26 Pages Posted: 6 Feb 2012
Date Written: August 15, 2009
Due to the ability of cell phone providers to use cell phone towers to pinpoint users’ locations, federal E911 requirements, the increasing popularity of GPS-capabilities in cellular phones, and the rise of cellular phones for Internet use, a plethora of new applications have been developed that share users’ real-time location information online . This paper evaluates users’ risk and benefit perceptions related to the use of these technologies and the privacy controls of existing location-sharing applications. We conducted an online survey of American Internet users (n = 587) to evaluate users’ perceptions of the likelihood of several location-sharing use scenarios along with the magnitude of the benefit or harm of each scenario (e.g. being stalked or finding people in an emergency). We find that although the majority of our respondents had heard of location-sharing technologies (72.4%), they do not yet understand the potential value of these applications, and they have concerns about sharing their location information online. Most importantly, participants are extremely concerned about controlling who has access to their location. Generally, respondents feel the risks of using location-sharing technologies outweigh the benefits. Respondents felt that the most likely harms would stem from revealing the location of their home to others or being stalked. People felt the strongest benefit were being able to find people in an emergency and being able to track their children. We then analyzed existing commercial location-sharing applications’ privacy controls (n = 89). We find that while location-sharing applications do not offer their users a diverse set of rules to control the disclosure of their location, they offer a modicum of privacy.
Suggested Citation: Suggested Citation
Do you have a job opening that you would like to promote on SSRN?
Proposing the Online Community Self-Disclosure Model: The Case of Working Professionals in France and the UK Who Use Online Communities
By Clay Posey, Paul Benjamin Lowry, ...
Explaining and Predicting the Impact of Branding Alliances and Website Quality on Initial Consumer Trust of E-Commerce Websites
By Paul Benjamin Lowry, Anthony Vance, ...
Effects of Culture, Social Presence, and Group Composition on Trust in Technology-Supported Decision-Making Groups
By Paul Benjamin Lowry, Dongsong Zhang, ...
Using an Elaboration Likelihood Approach to Better Understand the Persuasiveness of Website Privacy Assurance Cues for Online Consumers
By Paul Benjamin Lowry, Gregory D Moody, ...
A Picture is Worth a Thousand Words: Source Credibility Theory Applied to Logo and Website Design for Heightened Credibility and Consumer Trust
By Paul Benjamin Lowry, David Wilson, ...
Towards a Cross-Cultural Model of Online Whistle-Blowing Systems Use
By Paul Benjamin Lowry, Kamel Rouibah, ...
Proposing the Affect-Trust Infusion Model (ATIM) to Explain and Predict the Influence of High- and Low-Affect Infusion on Web Vendor Trust
By Paul Benjamin Lowry, Jeffrey L. Jenkins, ...
The Roles of Privacy Assurance, Network Effects, and Information Cascades in the Adoption of and Willingness to Pay for Location-Based Services with Mobile Applications
By Mark J. Keith, Jeffry Babb, ...
Be Careful What You Wish For: Proposing the IT Policy Control-Reactance Model (ITPCRM) to Predict Professionals’ Intent to Comply with New IT Security Policies Along with Their Resulting Anger
By Paul Benjamin Lowry, Noelle Teh, ...
Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior
By Mark J. Keith, Samuel Thompson, ...