Empirical Models of Privacy in Location Sharing
48
-
Upload
eran-toch -
Category
Technology
-
view
1.347 -
download
4
description
Recently, I presented our paper "Empirical models of privacy in location sharing" (PDF) in Ucibomp - a great conference about mobile computing. The idea behind the paper is to study what type of privacy preferences people assign to distinct places in location sharing scenarios (e.g., when using applications such as Foursquare, Facebook Places and Google Latitude). In order to study this question, we asked 28 people to use our location sharing application, Locaccino, with their actual friends for a month. We found out that people are more likely to share places with high entropy: places which are visited frequently by a diverse population. Entropy is a super-easy method for predicting which places will be shared. Also, we have seen that users who visit lots of low entropy places are more likely to have more privacy concerns and more restrictive privacy preferences. You can find more information about the paper here: http://bit.ly/aRLqje
Transcript of Empirical Models of Privacy in Location Sharing
![Page 1: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/1.jpg)
![Page 2: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/2.jpg)
![Page 3: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/3.jpg)
![Page 4: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/4.jpg)
![Page 5: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/5.jpg)
![Page 6: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/6.jpg)
![Page 7: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/7.jpg)
![Page 8: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/8.jpg)
![Page 9: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/9.jpg)
![Page 10: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/10.jpg)
![Page 11: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/11.jpg)
![Page 12: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/12.jpg)
![Page 13: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/13.jpg)
![Page 14: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/14.jpg)
![Page 15: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/15.jpg)
![Page 16: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/16.jpg)
![Page 17: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/17.jpg)
![Page 18: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/18.jpg)
![Page 19: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/19.jpg)
![Page 20: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/20.jpg)
![Page 21: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/21.jpg)
![Page 22: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/22.jpg)
![Page 23: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/23.jpg)
![Page 24: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/24.jpg)
![Page 25: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/25.jpg)
![Page 26: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/26.jpg)
![Page 27: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/27.jpg)
![Page 28: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/28.jpg)
![Page 29: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/29.jpg)
![Page 30: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/30.jpg)
![Page 31: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/31.jpg)
![Page 32: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/32.jpg)
![Page 33: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/33.jpg)
![Page 34: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/34.jpg)
![Page 35: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/35.jpg)
![Page 36: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/36.jpg)
![Page 37: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/37.jpg)
![Page 38: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/38.jpg)
![Page 39: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/39.jpg)
![Page 40: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/40.jpg)
![Page 41: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/41.jpg)
![Page 42: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/42.jpg)
![Page 43: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/43.jpg)
![Page 44: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/44.jpg)
![Page 45: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/45.jpg)
![Page 46: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/46.jpg)
![Page 47: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/47.jpg)
![Page 48: Empirical Models of Privacy in Location Sharing](https://reader033.fdocuments.in/reader033/viewer/2022060107/5549f3dcb4c9051e488b583e/html5/thumbnails/48.jpg)