Abstract
We envision a unique social interaction system, ‘users-as-beacons’ built upon Bluetooth Low Energy (BLE) beacon technology, that could provide potential privacy benefits. It leverages BLE to employ the user devices to act as mobile beacons. Its potential applications include community-based social networking, localized advertising, and instant reviewing. To evaluate the potential for this system and inform design, we conducted an exploratory interview study of 27 participants of a hypothetical localized content-creating system. Using a design prototype and multiple scenarios as prompts, we asked questions regarding users’ perceptions of the potential benefits and challenges of a users-as-beacons system, focusing in particular on their privacy concerns and needs. Our results indicate that users do perceive the benefit of increased trustworthiness of user-beacons, but do not have expectations of greater location or behavioral tracking privacy. We highlight multiple design challenges of this system in supporting the trustworthy, relevant, and timely sharing of posts between people in a community.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sterling, G.: Report: 93 percent of US baseball stadiums have deployed beacons - marketing land, August 2016. https://marketingland.com/report-93-percent-us-baseball-stadiums-deployed-beacons-186677. Accessed 22 Jan 2019
Smart industry | bluetooth technology website. https://www.bluetooth.com/markets/smart-industry. Accessed 15 Jan 2019
Decentralized privacy-preserving proximity tracing. https://github.com/DP-3T/documents. Accessed 2 June 2020
Bay, J., et al.: BlueTrace: a privacy-preserving protocol for community-driven contact tracing across borders. Government Technology Agency-Singapore, Technical Report (2020)
Kelley, P.G., Consolvo, S., Cranor, L.F., Jung, J., Sadeh, N., Wetherall, D.: A conundrum of permissions: installing applications on an android smartphone. In: Blyth, J., Dietrich, S., Camp, L.J. (eds.) FC 2012. LNCS, vol. 7398, pp. 68–79. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34638-5_6
Sanders, E.B.-N., Stappers, P.J.: Probes, toolkits and prototypes: three approaches to making in codesigning. CoDesign 10(1), 5–14 (2014)
Hansen, S.S., Lee, J.K., Lee, S.-Y.: Consumer-generated ads on YouTube: impacts of source credibility and need for cognition on attitudes, interactive behaviors, and eWOM. J. Electron. Commerce Res. 15(3), 254 (2014)
Lawrence, B., Fournier, S., Brunel, F.: When companies don’t make the ad: a multimethod inquiry into the differential effectiveness of Consumer-Generated advertising. J. Advert. 42(4), 292–307 (2013)
Forman, C., Ghose, A., Wiesenfeld, B.: Examining the relationship between reviews and sales: the role of reviewer identity disclosure in electronic markets. Inf. Syst. Res. 19(3), 291–313, 1 (2008)
Shih, H.-P., Lai, K.-H., Cheng, T.C.E.: Constraint-based and dedication-based mechanisms for encouraging online self-disclosure: is personalization the only thing that matters? Eur. J. Inf. Syst. 26(4), 432–450 (2017)
Tawfiq, A., Richard, B.: The privacy paradox: the role of cognitive absorption in the social networking activity. In: ICIS 2015 Proceedings (2015). aisel.aisnet.org
Zwass, V.: Co-creation: toward a taxonomy and an integrated research perspective. Int. J. Electron. Commerce 8 (2014)
Banerjee, S., Bhattacharyya, S., Bose, I.: Whose online reviews to trust? Understanding reviewer trustworthiness and its impact on business. Decis. Support Syst. 96, 17–26 (2017)
Luca, M., Zervas, G.: Fake it till you make it: reputation, competition, and yelp review fraud. Manage. Sci. 62(12), 3412–3427 (2016)
Fayazi, A., Lee, K., Caverlee, J., Squicciarini, A.: Uncovering crowdsourced manipulation of online reviews. In: Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2015, pp. 233–242. ACM, New York (2015)
Mathwick, C., Mosteller, J.: Online reviewer engagement: a typology based on reviewer motivations. J. Serv. Res. 20(2), 204–218 (2017)
Zhang, D., Zhou, L., Kehoe, J.L., Kilic, I.Y.: What online reviewer behaviors really matter? Effects of verbal and nonverbal behaviors on detection of fake online reviews. J. Manag. Inf. Syst. 33(2), 456–481 (2016)
Besmer, A., Watson, J., Lipford, H.R.: The impact of social navigation on privacy policy configuration. In: Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010, pp. 7:1–7:10. ACM, New York (2010)
Krasnova, H., Kolesnikova, E., Günther, O.: “It won’t happen to me!”: self-disclosure in online social networks 343, 01 (2009)
Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P.G., Cranor, L.F.: “i regretted the minute i pressed share”: a qualitative study of regrets on Facebook. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS 2011, pp. 10:1–10:16. ACM, New York (2011)
Johnson, M., Egelman, S., Bellovin, S.M.: Facebook and privacy: it’s complicated. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS 2012, pp. 9:1–9:15. ACM, New York (2012)
Staddon, J., Huffaker, D., Brown, L., Sedley, A.: Are privacy concerns a turn-off?: Engagement and privacy in social networks. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS 2012, pp. 10:1–10:13. ACM, New York (2012)
Edmonds, R.: People don’t want to trade privacy for targeted ads, January 2016. https://www.poynter.org/news/people-dont-want-trade-privacy-targeted-ads. Accessed 11 July 2017
(Catherine) Jai, T.-M., Burns, L.D., King, N.J.: The effect of behavioral tracking practices on consumers’ shopping evaluations and repurchase intention toward trusted online retailers. Comput. Hum. Behav. 29(3), 901–909 (2013)
Turow, J., Hennessy, M., Draper, N.A.: The tradeoff fallacy: how marketers are misrepresenting American consumers and opening them up to exploitation (2015)
Xu, H., (Robert) Luo, X., Carroll, J.M., Rosson, M.B.: The personalization privacy paradox: an exploratory study of decision making process for location-aware marketing. Decis. Support Syst. 51(1), 42–52 (2011)
Consolvo, S., Smith, I.E., Matthews, T., LaMarca, A., Tabert, J., Powledge, P.: Location disclosure to social relations: why, when, & what people want to share. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2005, pp. 81–90. ACM, New York (2005)
Iachello, G., et al.: Control, deception, and communication: evaluating the deployment of a location-enhanced messaging service. In: Beigl, M., Intille, S., Rekimoto, J., Tokuda, H. (eds.) UbiComp 2005. LNCS, vol. 3660, pp. 213–231. Springer, Heidelberg (2005). https://doi.org/10.1007/11551201_13
Sadeh, N., et al.: Understanding and capturing people’s privacy policies in a mobile social networking application. Personal Ubiquitous Comput. 13(6), 401–412 (2009)
Benisch, M., Kelley, P.G., Sadeh, N., Cranor, L.F.: Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs. Personal Ubiquitous Comput. 15(7), 679–694 (2011)
Patil, S., Norcie, G., Kapadia, A., Lee, A.J.: Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS 2012, pp. 5:1–5:15. ACM, New York (2012)
Toch, E.: Empirical models of privacy in location sharing. In: Proceedings of the 12th ACM International Conference on Ubiquitous Computing, UbiComp 2010, pp. 129–138. ACM, New York (2010)
Fisher, D., Dorner, L., Wagner, D.: Short paper: location privacy: User behavior in the field. In: Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2012, pp. 51–56. ACM, New York (2012)
Kelley, P.G., Brewer, R., Mayer, Y., Cranor, L.F., Sadeh, N.: An investigation into Facebook friend grouping. In: Campos, P., Graham, N., Jorge, J., Nunes, N., Palanque, P., Winckler, M. (eds.) INTERACT 2011. LNCS, vol. 6948, pp. 216–233. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23765-2_15
Bello-Ogunu, E., Shehab, M., Miazi, N.S.: Privacy is the best policy: a framework for BLE beacon privacy management. In: 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), vol. 1, pp. 823–832 (2019)
Higuchi, T., Martin, P., Chakraborty, S., Srivastava, M.: AnonyCast: privacy-preserving location distribution for anonymous crowd tracking systems. In: Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2015, pp. 1119–1130. Association for Computing Machinery, New York (2015)
Schulz, T., Golatowski, F., Timmermann, D.: Secure privacy preserving information beacons for public transportation systems. In: 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp. 1–6 (2016)
Gao, S., Ma, J., Shi, W., Zhan, G., Sun, C.: TrPF: a trajectory privacy-preserving framework for participatory sensing. IEEE Trans. Inf. Forensics Secur. 8(6), 874–887 (2013)
Xing, B., Seada, K., Venkatasubramanian, N.: Proximiter: enabling mobile proximity-based content sharing on portable devices. In: 2009 IEEE International Conference on Pervasive Computing and Communications, pp. 1–3 (2009)
Jung, S., Lee, U., Chang, A., Cho, D.-K., Gerla, M.: BlueTorrent: cooperative content sharing for Bluetooth users. Pervasive Mob. Comput. 3(6), 609–634 (2007)
Shen, J., Li, Y., Peng, C., Zhang, Y.: MobiUS: a together-viewing mobile video experience. Mobisys’07 Best Demo Award, June 2007
Beach, A., et al.: WhozThat? Evolving an ecosystem for context-aware mobile social networks. IEEE Netw. 22(4), 50–55 (2008)
Tracetogether. https://www.tracetogether.gov.sg/. Accessed 15 Mar 2020
Faragher, R.: An analysis of the accuracy of Bluetooth low energy for indoor positioning applications (2014)
Yao, Y., Huang, Y., Wang, Y.: Unpacking people’s understandings of Bluetooth beacon systems-a location-based IoT technology. In: Proceedings of the 52nd Hawaii International Conference on System Sciences (2019)
Thamm, A., Anke, J., Haugk, S., Radic, D.: Towards the omni-channel: beacon-based services in retail. In: International Conference on Business Information Systems, vol. 255, pp. 181–192 (2016)
Bello-Ogunu, E., Shehab, M.: Crowdsourcing for context: regarding privacy in beacon encounters via contextual integrity. Proc. Privacy Enhancing Technol. 2016(3), 83–95 (2016)
Reichert, L., Brack, S., Scheuermann, B.: Privacy-preserving contact tracing of Covid-19 patients. IACR Cryptol. ePrint Arch. 2020, 375 (2020)
Bell, J., Butler, D., Hicks, C.: and Jon Crowcroft. Towards privacy preserving contact tracing, TraceSecure (2020)
Tang, Q.: Privacy-Preserving contact tracing: current solutions and open questions, April 2020
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 IFIP International Federation for Information Processing
About this paper
Cite this paper
Miazi, N.S., Lipford, H., Shehab, M. (2021). Exploring Perceptions of a Localized Content-Sharing System Using Users-as-Beacons. In: Ardito, C., et al. Human-Computer Interaction – INTERACT 2021. INTERACT 2021. Lecture Notes in Computer Science(), vol 12933. Springer, Cham. https://doi.org/10.1007/978-3-030-85616-8_21
Download citation
DOI: https://doi.org/10.1007/978-3-030-85616-8_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-85615-1
Online ISBN: 978-3-030-85616-8
eBook Packages: Computer ScienceComputer Science (R0)