Skip to main content

Exploring Perceptions of a Localized Content-Sharing System Using Users-as-Beacons

  • Conference paper
  • First Online:
Human-Computer Interaction – INTERACT 2021 (INTERACT 2021)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12933))

Included in the following conference series:

  • 2623 Accesses

Abstract

We envision a unique social interaction system, ‘users-as-beacons’ built upon Bluetooth Low Energy (BLE) beacon technology, that could provide potential privacy benefits. It leverages BLE to employ the user devices to act as mobile beacons. Its potential applications include community-based social networking, localized advertising, and instant reviewing. To evaluate the potential for this system and inform design, we conducted an exploratory interview study of 27 participants of a hypothetical localized content-creating system. Using a design prototype and multiple scenarios as prompts, we asked questions regarding users’ perceptions of the potential benefits and challenges of a users-as-beacons system, focusing in particular on their privacy concerns and needs. Our results indicate that users do perceive the benefit of increased trustworthiness of user-beacons, but do not have expectations of greater location or behavioral tracking privacy. We highlight multiple design challenges of this system in supporting the trustworthy, relevant, and timely sharing of posts between people in a community.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sterling, G.: Report: 93 percent of US baseball stadiums have deployed beacons - marketing land, August 2016. https://marketingland.com/report-93-percent-us-baseball-stadiums-deployed-beacons-186677. Accessed 22 Jan 2019

  2. Smart industry | bluetooth technology website. https://www.bluetooth.com/markets/smart-industry. Accessed 15 Jan 2019

  3. Decentralized privacy-preserving proximity tracing. https://github.com/DP-3T/documents. Accessed 2 June 2020

  4. Bay, J., et al.: BlueTrace: a privacy-preserving protocol for community-driven contact tracing across borders. Government Technology Agency-Singapore, Technical Report (2020)

    Google Scholar 

  5. Kelley, P.G., Consolvo, S., Cranor, L.F., Jung, J., Sadeh, N., Wetherall, D.: A conundrum of permissions: installing applications on an android smartphone. In: Blyth, J., Dietrich, S., Camp, L.J. (eds.) FC 2012. LNCS, vol. 7398, pp. 68–79. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34638-5_6

    Chapter  Google Scholar 

  6. Sanders, E.B.-N., Stappers, P.J.: Probes, toolkits and prototypes: three approaches to making in codesigning. CoDesign 10(1), 5–14 (2014)

    Article  Google Scholar 

  7. Hansen, S.S., Lee, J.K., Lee, S.-Y.: Consumer-generated ads on YouTube: impacts of source credibility and need for cognition on attitudes, interactive behaviors, and eWOM. J. Electron. Commerce Res. 15(3), 254 (2014)

    Google Scholar 

  8. Lawrence, B., Fournier, S., Brunel, F.: When companies don’t make the ad: a multimethod inquiry into the differential effectiveness of Consumer-Generated advertising. J. Advert. 42(4), 292–307 (2013)

    Article  Google Scholar 

  9. Forman, C., Ghose, A., Wiesenfeld, B.: Examining the relationship between reviews and sales: the role of reviewer identity disclosure in electronic markets. Inf. Syst. Res. 19(3), 291–313, 1 (2008)

    Google Scholar 

  10. Shih, H.-P., Lai, K.-H., Cheng, T.C.E.: Constraint-based and dedication-based mechanisms for encouraging online self-disclosure: is personalization the only thing that matters? Eur. J. Inf. Syst. 26(4), 432–450 (2017)

    Google Scholar 

  11. Tawfiq, A., Richard, B.: The privacy paradox: the role of cognitive absorption in the social networking activity. In: ICIS 2015 Proceedings (2015). aisel.aisnet.org

  12. Zwass, V.: Co-creation: toward a taxonomy and an integrated research perspective. Int. J. Electron. Commerce 8 (2014)

    Google Scholar 

  13. Banerjee, S., Bhattacharyya, S., Bose, I.: Whose online reviews to trust? Understanding reviewer trustworthiness and its impact on business. Decis. Support Syst. 96, 17–26 (2017)

    Google Scholar 

  14. Luca, M., Zervas, G.: Fake it till you make it: reputation, competition, and yelp review fraud. Manage. Sci. 62(12), 3412–3427 (2016)

    Article  Google Scholar 

  15. Fayazi, A., Lee, K., Caverlee, J., Squicciarini, A.: Uncovering crowdsourced manipulation of online reviews. In: Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2015, pp. 233–242. ACM, New York (2015)

    Google Scholar 

  16. Mathwick, C., Mosteller, J.: Online reviewer engagement: a typology based on reviewer motivations. J. Serv. Res. 20(2), 204–218 (2017)

    Article  Google Scholar 

  17. Zhang, D., Zhou, L., Kehoe, J.L., Kilic, I.Y.: What online reviewer behaviors really matter? Effects of verbal and nonverbal behaviors on detection of fake online reviews. J. Manag. Inf. Syst. 33(2), 456–481 (2016)

    Google Scholar 

  18. Besmer, A., Watson, J., Lipford, H.R.: The impact of social navigation on privacy policy configuration. In: Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010, pp. 7:1–7:10. ACM, New York (2010)

    Google Scholar 

  19. Krasnova, H., Kolesnikova, E., Günther, O.: “It won’t happen to me!”: self-disclosure in online social networks 343, 01 (2009)

    Google Scholar 

  20. Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P.G., Cranor, L.F.: “i regretted the minute i pressed share”: a qualitative study of regrets on Facebook. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS 2011, pp. 10:1–10:16. ACM, New York (2011)

    Google Scholar 

  21. Johnson, M., Egelman, S., Bellovin, S.M.: Facebook and privacy: it’s complicated. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS 2012, pp. 9:1–9:15. ACM, New York (2012)

    Google Scholar 

  22. Staddon, J., Huffaker, D., Brown, L., Sedley, A.: Are privacy concerns a turn-off?: Engagement and privacy in social networks. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS 2012, pp. 10:1–10:13. ACM, New York (2012)

    Google Scholar 

  23. Edmonds, R.: People don’t want to trade privacy for targeted ads, January 2016. https://www.poynter.org/news/people-dont-want-trade-privacy-targeted-ads. Accessed 11 July 2017

  24. (Catherine) Jai, T.-M., Burns, L.D., King, N.J.: The effect of behavioral tracking practices on consumers’ shopping evaluations and repurchase intention toward trusted online retailers. Comput. Hum. Behav. 29(3), 901–909 (2013)

    Google Scholar 

  25. Turow, J., Hennessy, M., Draper, N.A.: The tradeoff fallacy: how marketers are misrepresenting American consumers and opening them up to exploitation (2015)

    Google Scholar 

  26. Xu, H., (Robert) Luo, X., Carroll, J.M., Rosson, M.B.: The personalization privacy paradox: an exploratory study of decision making process for location-aware marketing. Decis. Support Syst. 51(1), 42–52 (2011)

    Google Scholar 

  27. Consolvo, S., Smith, I.E., Matthews, T., LaMarca, A., Tabert, J., Powledge, P.: Location disclosure to social relations: why, when, & what people want to share. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2005, pp. 81–90. ACM, New York (2005)

    Google Scholar 

  28. Iachello, G., et al.: Control, deception, and communication: evaluating the deployment of a location-enhanced messaging service. In: Beigl, M., Intille, S., Rekimoto, J., Tokuda, H. (eds.) UbiComp 2005. LNCS, vol. 3660, pp. 213–231. Springer, Heidelberg (2005). https://doi.org/10.1007/11551201_13

    Chapter  Google Scholar 

  29. Sadeh, N., et al.: Understanding and capturing people’s privacy policies in a mobile social networking application. Personal Ubiquitous Comput. 13(6), 401–412 (2009)

    Article  Google Scholar 

  30. Benisch, M., Kelley, P.G., Sadeh, N., Cranor, L.F.: Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs. Personal Ubiquitous Comput. 15(7), 679–694 (2011)

    Google Scholar 

  31. Patil, S., Norcie, G., Kapadia, A., Lee, A.J.: Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS 2012, pp. 5:1–5:15. ACM, New York (2012)

    Google Scholar 

  32. Toch, E.: Empirical models of privacy in location sharing. In: Proceedings of the 12th ACM International Conference on Ubiquitous Computing, UbiComp 2010, pp. 129–138. ACM, New York (2010)

    Google Scholar 

  33. Fisher, D., Dorner, L., Wagner, D.: Short paper: location privacy: User behavior in the field. In: Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2012, pp. 51–56. ACM, New York (2012)

    Google Scholar 

  34. Kelley, P.G., Brewer, R., Mayer, Y., Cranor, L.F., Sadeh, N.: An investigation into Facebook friend grouping. In: Campos, P., Graham, N., Jorge, J., Nunes, N., Palanque, P., Winckler, M. (eds.) INTERACT 2011. LNCS, vol. 6948, pp. 216–233. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23765-2_15

    Chapter  Google Scholar 

  35. Bello-Ogunu, E., Shehab, M., Miazi, N.S.: Privacy is the best policy: a framework for BLE beacon privacy management. In: 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), vol. 1, pp. 823–832 (2019)

    Google Scholar 

  36. Higuchi, T., Martin, P., Chakraborty, S., Srivastava, M.: AnonyCast: privacy-preserving location distribution for anonymous crowd tracking systems. In: Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2015, pp. 1119–1130. Association for Computing Machinery, New York (2015)

    Google Scholar 

  37. Schulz, T., Golatowski, F., Timmermann, D.: Secure privacy preserving information beacons for public transportation systems. In: 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp. 1–6 (2016)

    Google Scholar 

  38. Gao, S., Ma, J., Shi, W., Zhan, G., Sun, C.: TrPF: a trajectory privacy-preserving framework for participatory sensing. IEEE Trans. Inf. Forensics Secur. 8(6), 874–887 (2013)

    Article  Google Scholar 

  39. Xing, B., Seada, K., Venkatasubramanian, N.: Proximiter: enabling mobile proximity-based content sharing on portable devices. In: 2009 IEEE International Conference on Pervasive Computing and Communications, pp. 1–3 (2009)

    Google Scholar 

  40. Jung, S., Lee, U., Chang, A., Cho, D.-K., Gerla, M.: BlueTorrent: cooperative content sharing for Bluetooth users. Pervasive Mob. Comput. 3(6), 609–634 (2007)

    Article  Google Scholar 

  41. Shen, J., Li, Y., Peng, C., Zhang, Y.: MobiUS: a together-viewing mobile video experience. Mobisys’07 Best Demo Award, June 2007

    Google Scholar 

  42. Beach, A., et al.: WhozThat? Evolving an ecosystem for context-aware mobile social networks. IEEE Netw. 22(4), 50–55 (2008)

    Article  Google Scholar 

  43. Tracetogether. https://www.tracetogether.gov.sg/. Accessed 15 Mar 2020

  44. Faragher, R.: An analysis of the accuracy of Bluetooth low energy for indoor positioning applications (2014)

    Google Scholar 

  45. Yao, Y., Huang, Y., Wang, Y.: Unpacking people’s understandings of Bluetooth beacon systems-a location-based IoT technology. In: Proceedings of the 52nd Hawaii International Conference on System Sciences (2019)

    Google Scholar 

  46. Thamm, A., Anke, J., Haugk, S., Radic, D.: Towards the omni-channel: beacon-based services in retail. In: International Conference on Business Information Systems, vol. 255, pp. 181–192 (2016)

    Google Scholar 

  47. Bello-Ogunu, E., Shehab, M.: Crowdsourcing for context: regarding privacy in beacon encounters via contextual integrity. Proc. Privacy Enhancing Technol. 2016(3), 83–95 (2016)

    Article  Google Scholar 

  48. Reichert, L., Brack, S., Scheuermann, B.: Privacy-preserving contact tracing of Covid-19 patients. IACR Cryptol. ePrint Arch. 2020, 375 (2020)

    Google Scholar 

  49. Bell, J., Butler, D., Hicks, C.: and Jon Crowcroft. Towards privacy preserving contact tracing, TraceSecure (2020)

    Google Scholar 

  50. Tang, Q.: Privacy-Preserving contact tracing: current solutions and open questions, April 2020

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nazmus Sakib Miazi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Miazi, N.S., Lipford, H., Shehab, M. (2021). Exploring Perceptions of a Localized Content-Sharing System Using Users-as-Beacons. In: Ardito, C., et al. Human-Computer Interaction – INTERACT 2021. INTERACT 2021. Lecture Notes in Computer Science(), vol 12933. Springer, Cham. https://doi.org/10.1007/978-3-030-85616-8_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-85616-8_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-85615-1

  • Online ISBN: 978-3-030-85616-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics